CVE-2025-62820
Nebula vulnerability analysis and mitigation

Overview

Slack Nebula versions before 1.9.7 contain a vulnerability where the software mishandles CIDR in certain configurations, allowing acceptance of arbitrary source IP addresses within the Nebula network. The vulnerability was discovered in October 2025 and affects the network access control functionality of the software (Miggo Database).

Technical details

The vulnerability stems from a flaw in the custom CIDR tree implementation (cidr.Tree4 and cidr.Tree6) used for IP-based access control in various components, including the firewall and allow lists. The issue was introduced when the code was changed to add the entire network instead of only the IP specified in the certificate. The vulnerability has been assigned a CVSS v3.1 score of 4.9 (Medium) with a vector string of CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:L and is classified as CWE-420 (Unprotected Alternate Channel) (Miggo Database, NVD).

Impact

The vulnerability enables an attacker with control of a node (having a certificate with multiple IP addresses or a subnet routed through it) to perform IP spoofing within the Nebula network. This allows the attacker to send traffic impersonating another node, potentially leading to unauthorized UDP packet transmission or disruption of traffic through TCP RST packets (GitHub PR).

Mitigation and workarounds

The vulnerability has been patched in Slack Nebula version 1.9.7. The fix involves replacing the custom CIDR implementation with a standard, well-tested library (github.com/gaissmai/bart) and migrating from net.IP to the more modern net/netip package. Users are advised to upgrade to version 1.9.7 or later to address this security issue (GitHub PR).

Additional resources


SourceThis report was generated using AI

Related Nebula vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2022-1996CRITICAL9.1
  • cAdvisorcAdvisor
  • golang-github-temoto-robotstxt-debuginfo
NoYesJun 08, 2022
CVE-2023-48795MEDIUM5.9
  • PythonPython
  • temporal-ui-server
NoYesDec 18, 2023
CVE-2022-29526MEDIUM5.3
  • cAdvisorcAdvisor
  • golang-github-hashicorp-hclog-devel
NoYesJun 23, 2022
CVE-2025-62820MEDIUM4.9
  • NebulaNebula
  • step-fips
NoYesOct 23, 2025
CVE-2022-30629LOW3.1
  • cAdvisorcAdvisor
  • golang-gopkg-square-jose-2-devel
NoYesAug 10, 2022

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management