Exploit Report

Computer Security And Bug Information

CVE-2023-27595

CVECVE-2023-27595
CVE Title
Published Date2023-03-17T22:15Z
Modified Date2023-03-20T02:46Z
CWE TypeCWE-755
DescriptionCilium is a networking, observability, and security solution with an eBPF-based dataplane. In version 1.13.0, when Cilium is started, there is a short period when Cilium eBPF programs are not attached to the host. During this period, the host does not implement any of Cilium's featureset. This can cause disruption to newly established connections during this period due to the lack of Load Balancing, or can cause Network Policy bypass due to the lack of Network Policy enforcement during the window. This vulnerability impacts any Cilium-managed endpoints on the node (such as Kubernetes Pods), as well as the host network namespace (including Host Firewall). This vulnerability is fixed in Cilium 1.13.1 or later. Cilium releases 1.12.x, 1.11.x, and earlier are not affected. There are no known workarounds.
References
By clicking these links you will leave this website. We do not endorse and will not be held accountable for any activity on external sites.
Reference URLhttps://github.com/cilium/cilium/releases/tag/v1.13.1
Reference DescriptionMISC https://github.com/cilium/cilium/releases/tag/v1.13.1
Reference URLhttps://github.com/cilium/cilium/security/advisories/GHSA-r5x6-w42p-jhpp
Reference DescriptionMISC https://github.com/cilium/cilium/security/advisories/GHSA-r5x6-w42p-jhpp
Reference URLhttps://github.com/cilium/cilium/pull/24336
Reference DescriptionMISC https://github.com/cilium/cilium/pull/24336
Sources NIST MITRE
Note
  • No CVSS data for this CVE

This site's data is aggregated programmatically and provided "as is" without any representations or warranties, express or implied. Exploit.report is not affiliated with the The MITRE Corporation, U.S. Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA), or US government in any way. CVE and the CVE logo are registered trademarks of The MITRE Corporation

© 2022 Exploit.Report | Data | Contact | Privacy Policy | Articles