Vulnerability DatabaseGHSA-c66w-hq56-4q97

GHSA-c66w-hq56-4q97
vulnerability analysis and mitigation

Overview

A low severity vulnerability (GHSA-c66w-hq56-4q97) was discovered in Cilium affecting versions 1.7.8-1.7.14, 1.8.3-1.8.7, and 1.9.0-1.9.4. The vulnerability allows ICMP Echo Requests to bypass network policies under specific conditions, potentially compromising network security controls (GitHub Advisory).

Technical details

The vulnerability specifically affects ICMP Echo Request handling in Cilium's network policy enforcement. It occurs when network policies are configured to disallow access from an actor to an endpoint while allowing access from the endpoint to the actor without specifying protocol or port. The bypass happens when an endpoint sends an ICMP Echo Request to an actor with a specific ICMP identifier X, and the actor responds with an Echo Request using the same identifier before Cilium's conntrack GC removes the initial conntrack entry (GitHub Advisory).

Impact

The vulnerability only affects ICMP Echo Request traffic and does not impact UDP or TCP traffic. When successfully exploited, it allows an actor (pod, cluster host, or remote host) to bypass network policies that should prevent access to specific endpoints (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in Cilium versions 1.7.15, 1.8.8, and 1.9.5. Users are advised to upgrade to these patched versions to prevent potential network policy bypasses (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management