CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
AI Score
Confidence
High
EPSS
Percentile
48.0%
Cilium’s HTTP policies are not consistently applied to all traffic in the scope of the policies, leading to HTTP traffic being incorrectly and intermittently forwarded when it should be dropped.
This issue affects:
This issue has been patched in:
There is no workaround for this issue – affected users are strongly encouraged to upgrade.
The Cilium community has worked together with members of Isovalent to prepare these mitigations. Special thanks to @romikps for discovering and reporting this issue, and @sayboras and @jrajahalme for preparing the fix.
If you have any questions or comments about this advisory, please reach out on Slack.
If you think you have found a vulnerability affecting Cilium, we strongly encourage you to report it to our security mailing list at [email protected]. This is a private mailing list for the Cilium internal security team, and your report will be treated as top priority.
docs.cilium.io/en/stable/security/policy/language/#http
github.com/cilium/cilium
github.com/cilium/cilium/releases/tag/v1.13.13
github.com/cilium/cilium/releases/tag/v1.14.8
github.com/cilium/cilium/releases/tag/v1.15.2
github.com/cilium/cilium/security/advisories/GHSA-68mj-9pjq-mc85
nvd.nist.gov/vuln/detail/CVE-2024-28248
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
AI Score
Confidence
High
EPSS
Percentile
48.0%