Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-34242
HistoryJun 15, 2023 - 7:07 p.m.

CVE-2023-34242 Cilium vulnerable to information leakage via incorrect ReferenceGrant handling

2023-06-1519:07:14
CWE-200
GitHub_M
www.cve.org
2
cilium
ebpf-based
information leakage
gateway api
namespace
secrets
services
rbac
cve-2023-34242

CVSS3

3.4

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N

AI Score

5.4

Confidence

High

EPSS

0.001

Percentile

21.5%

Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Prior to version 1.13.4, when Gateway API is enabled in Cilium, the absence of a check on the namespace in which a ReferenceGrant is created could result in Cilium unintentionally gaining visibility of secrets (including certificates) and services across namespaces. An attacker on an affected cluster can leverage this issue to use cluster secrets that should not be visible to them, or communicate with services that they should not have access to. Gateway API functionality is disabled by default. This vulnerability is fixed in Cilium release 1.13.4. As a workaround, restrict the creation of ReferenceGrant resources to admin users by using Kubernetes RBAC.

CNA Affected

[
  {
    "vendor": "cilium",
    "product": "cilium",
    "versions": [
      {
        "version": "< 1.13.4",
        "status": "affected"
      }
    ]
  }
]

CVSS3

3.4

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N

AI Score

5.4

Confidence

High

EPSS

0.001

Percentile

21.5%

Related for CVELIST:CVE-2023-34242