CVE-2025-62820
Nebula vulnerability analysis and mitigation

Overview

Slack Nebula before version 1.9.7 contains a vulnerability where it mishandles CIDR in some configurations, allowing acceptance of arbitrary source IP addresses within the Nebula network. The vulnerability was discovered on October 7, 2025, and was disclosed on October 23, 2025. This issue affects Slack Nebula versions 1.9.4 and later up to version 1.9.7 (Miggo Database, NVD).

Technical details

The vulnerability stems from an improper CIDR construction in the hostmap.go file. The bug was introduced when the code was changed to add the entire network instead of only the IP specified in the certificate. The issue specifically occurs when using the incorrect Mask.Size() instead of addr's BitLen() for CIDR construction. The vulnerability has been assigned a CVSS v3.1 base score of 4.9 (Medium) with the vector string CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:L (Miggo Database).

Impact

If exploited, this vulnerability allows an attacker who has control of or has compromised a node with a certificate that matches specific requirements to perform IP spoofing within the Nebula network. The attacker could send traffic impersonating another node, enabling them to send arbitrary UDP packets to services or disrupt traffic by sending TCP RST packets (GitHub PR 1493).

Mitigation and workarounds

The vulnerability has been fixed in Slack Nebula version 1.9.7. The fix involves correcting the CIDR construction in hostmap.go by using addr's BitLen() instead of Mask.Size(). Users are advised to upgrade to version 1.9.7 or later to address this security issue (GitHub PR 1494).

Additional resources


SourceThis report was generated using AI

Related Nebula vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2022-1996CRITICAL9.1
  • cAdvisorcAdvisor
  • golang-github-pressly-goose-debuginfo
NoYesJun 08, 2022
CVE-2023-48795MEDIUM5.9
  • PythonPython
  • openshift4::ose-aws-ebs-csi-driver-rhel9@sha256:c03074b99f30237652e03d17f1faef8f14cbf6e40183d03b8e347803573cfc62_arm64
NoYesDec 18, 2023
CVE-2022-29526MEDIUM5.3
  • cAdvisorcAdvisor
  • apache-cloudstack-cloudmonkey-debuginfo
NoYesJun 23, 2022
CVE-2025-62820MEDIUM4.9
  • NebulaNebula
  • caddy
NoYesOct 23, 2025
CVE-2022-30629LOW3.1
  • cAdvisorcAdvisor
  • openshift4::ose-gcp-pd-csi-driver-operator-rhel8@sha256:c0a3c993a9fcf0d645dec39a20464688837e35c82c08f5ca95fdf1b70d842806_ppc64le
NoYesAug 10, 2022

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management