Skip to content

Commit 2b21a3b

Browse files
1 parent bf63bc6 commit 2b21a3b

1 file changed

Lines changed: 116 additions & 0 deletions

File tree

Lines changed: 116 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,116 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-hxv8-4j4r-cqgv",
4+
"modified": "2026-03-26T16:48:31Z",
5+
"published": "2026-03-26T16:48:31Z",
6+
"aliases": [
7+
"CVE-2026-33726"
8+
],
9+
"summary": "Cilium L7 proxy may bypass Kubernetes NetworkPolicy for same-node traffic",
10+
"details": "### Impact\n\nIngress [Network Policies](https://docs.cilium.io/en/stable/network/kubernetes/policy/#network-policy) are not enforced for traffic from pods to L7 Services ([Envoy](https://docs.cilium.io/en/stable/network/servicemesh/l7-traffic-management), GAMMA) with a local backend on the same node, when [Per-Endpoint Routing](https://docs.cilium.io/en/stable/network/concepts/routing/#routing) is enabled and [BPF Host Routing](https://docs.cilium.io/en/stable/operations/performance/tuning/#ebpf-host-routing) is disabled.\n\nPer-Endpoint Routing is disabled by default, but is automatically enabled in deployments using cloud IPAM, including Cilium ENI on EKS (`eni.enabled`), AlibabaCloud ENI (`alibabacloud.enabled`), Azure IPAM (`azure.enabled`, but not AKS BYOCNI), and some GKE deployments (`gke.enabled`; managed offerings such as GKE Dataplane V2 may use different defaults). It is typically not enabled in tunneled deployments, and chaining deployments are not affected. In practice, Amazon EKS with Cilium ENI mode is likely the most common affected environment.\n\n### Patches\n\nThis issue was fixed by #44693.\n\nThis issue affects:\n\n* Cilium v1.19 between v1.19.0 and v1.19.1 inclusive\n* Cilium v1.18 between v1.18.0 and v1.18.7 inclusive\n* All versions of Cilium prior to v1.17.13\n\nThis issue is fixed in:\n\n* Cilium v1.19.2\n* Cilium v1.18.8\n* Cilium v1.17.14\n\n### Workarounds\n\nDisclaimer: There is currently no officially verified or comprehensive workaround for this issue. The only option would be to disable per-endpoint routes, but this will likely cause disruptions to ongoing connections, and potential conflicts if running in cloud providers.\n\n### Acknowledgements\n\nThe Cilium community has worked together with members of the Northflank and Isovalent teams to prepare these mitigations. Cilium thanks @sudeephb and @Champ-Goblem for reporting the issue and to @smagnani96 and @julianwiedmann for helping with the resolution.\n\n### For more information\n\nAnyone who believes a vulnerability affecting Cilium has been found is strongly encouraged to report it to the security mailing list at security@cilium.io. This is a private mailing list for the Cilium security team, and any such report will be treated as top priority. Please also address any comments or questions on this advisory to the same mailing list.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Go",
21+
"name": "github.com/cilium/cilium"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "1.17.14"
32+
}
33+
]
34+
}
35+
]
36+
},
37+
{
38+
"package": {
39+
"ecosystem": "Go",
40+
"name": "github.com/cilium/cilium"
41+
},
42+
"ranges": [
43+
{
44+
"type": "ECOSYSTEM",
45+
"events": [
46+
{
47+
"introduced": "1.18.0"
48+
},
49+
{
50+
"fixed": "1.18.8"
51+
}
52+
]
53+
}
54+
]
55+
},
56+
{
57+
"package": {
58+
"ecosystem": "Go",
59+
"name": "github.com/cilium/cilium"
60+
},
61+
"ranges": [
62+
{
63+
"type": "ECOSYSTEM",
64+
"events": [
65+
{
66+
"introduced": "1.19.0"
67+
},
68+
{
69+
"fixed": "1.19.2"
70+
}
71+
]
72+
}
73+
]
74+
}
75+
],
76+
"references": [
77+
{
78+
"type": "WEB",
79+
"url": "https://github.com/cilium/cilium/security/advisories/GHSA-hxv8-4j4r-cqgv"
80+
},
81+
{
82+
"type": "WEB",
83+
"url": "https://github.com/cilium/cilium/pull/44693"
84+
},
85+
{
86+
"type": "WEB",
87+
"url": "https://docs.cilium.io/en/stable/network/concepts/routing/#routing"
88+
},
89+
{
90+
"type": "WEB",
91+
"url": "https://docs.cilium.io/en/stable/network/kubernetes/policy/#network-policy"
92+
},
93+
{
94+
"type": "WEB",
95+
"url": "https://docs.cilium.io/en/stable/network/servicemesh/l7-traffic-management"
96+
},
97+
{
98+
"type": "WEB",
99+
"url": "https://docs.cilium.io/en/stable/operations/performance/tuning/#ebpf-host-routing"
100+
},
101+
{
102+
"type": "PACKAGE",
103+
"url": "https://github.com/cilium/cilium"
104+
}
105+
],
106+
"database_specific": {
107+
"cwe_ids": [
108+
"CWE-284",
109+
"CWE-863"
110+
],
111+
"severity": "MODERATE",
112+
"github_reviewed": true,
113+
"github_reviewed_at": "2026-03-26T16:48:31Z",
114+
"nvd_published_at": null
115+
}
116+
}

0 commit comments

Comments
 (0)