CVE-2024-25631

Source
https://cve.org/CVERecord?id=CVE-2024-25631
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-25631.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-25631
Aliases
Related
Published
2024-02-20T18:08:56.946Z
Modified
2026-02-05T04:33:52.992022Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N CVSS Calculator
Summary
Unencrypted traffic between pods when using Wireguard and an external kvstore
Details

Cilium is a networking, observability, and security solution with an eBPF-based dataplane. For Cilium users who have enabled an external kvstore and Wireguard transparent encryption, traffic between pods in the affected cluster is not encrypted. This issue affects Cilium v1.14 before v1.14.7 and has been patched in Cilium v1.14.7. There is no workaround to this issue.

Database specific
{
    "cwe_ids": [
        "CWE-311"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/25xxx/CVE-2024-25631.json",
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/cilium/cilium

Affected ranges

Type
GIT
Repo
https://github.com/cilium/cilium
Events

Affected versions

1.*
1.14.0
1.14.1
1.14.2
1.14.3
1.14.4
1.14.5
1.14.6
v1.*
v1.14.0
v1.14.1
v1.14.2
v1.14.3
v1.14.4
v1.14.5
v1.14.6

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-25631.json"