Vulnerability DatabaseGHSA-wc5v-r48v-g4vh

GHSA-wc5v-r48v-g4vh
vulnerability analysis and mitigation

Overview

A host policy bypass vulnerability was discovered in Cilium (GHSA-wc5v-r48v-g4vh) affecting versions <=1.10.12 and <=1.11.6. The vulnerability was published on July 15, 2022, and allows bypassing host policies specifically for IPv6 traffic originating from Cilium-managed pods and destined for the host-network namespace. The vulnerability only affects systems where IPv4, IPv6, endpoint routes, and host firewall are simultaneously enabled (GitHub Advisory).

Technical details

The vulnerability stems from a typo in the host firewall tail call that can lead to executing IPv6 code for IPv4 packets when enforcing host policies for traffic from local pods. The issue occurs specifically when IPv4, IPv6, and endpoint routes are all enabled. The vulnerability has been assigned a CVSS score of 3.3 (Low severity) with the following metrics: Attack Vector: Local, Attack Complexity: Low, Privileges Required: Low, User Interaction: None, Scope: Unchanged, Confidentiality: None, Integrity: None, and Availability: Low (GitHub Advisory).

Impact

The vulnerability's primary impact is the potential bypass of host policies for IPv6 traffic originating from Cilium-managed pods when communicating with the host-network namespace, such as host-network pods. It's worth noting that host policy enforcement on IPv4 traffic or traffic originating from outside the node remains unaffected. The vulnerability's impact is considered limited as endpoint routes are typically only enabled in specific environments like GKE, EKS, AKS, and OpenShift, where IPv6 is usually disabled, and host firewall is disabled by default (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in Cilium versions v1.10.13 and v1.11.7. For users unable to upgrade immediately, a recommended workaround is to configure network policies for all pods that prevent them from sending arbitrary traffic to the local node. The fix was implemented through a commit addressing the typo in the host firewall tail call (GitHub Advisory, Cilium Commit).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management