CVE-2024-28250

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-28250
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-28250.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-28250
Aliases
Related
Published
2024-03-18T21:42:21Z
Modified
2025-10-22T18:42:22.239800Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N CVSS Calculator
Summary
Cilium has possible unencrypted traffic between nodes when using WireGuard and L7 policies
Details

Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Starting in version 1.14.0 and prior to versions 1.14.8 and 1.15.2, In Cilium clusters with WireGuard enabled and traffic matching Layer 7 policies Wireguard-eligible traffic that is sent between a node's Envoy proxy and pods on other nodes is sent unencrypted and Wireguard-eligible traffic that is sent between a node's DNS proxy and pods on other nodes is sent unencrypted. This issue has been resolved in Cilium 1.14.8 and 1.15.2 in in native routing mode (routingMode=native) and in Cilium 1.14.4 in tunneling mode (routingMode=tunnel). Not that in tunneling mode, encryption.wireguard.encapsulate must be set to true. There is no known workaround for this issue.

Database specific
{
    "cwe_ids": [
        "CWE-311"
    ]
}
References

Affected packages

Git / github.com/cilium/cilium

Affected ranges

Type
GIT
Repo
https://github.com/cilium/cilium
Events
Type
GIT
Repo
https://github.com/cilium/cilium
Events

Affected versions

1.*

1.14.0
1.14.1
1.14.2
1.14.3
1.14.4
1.14.5
1.14.6
1.14.7
1.15.0
1.15.1

v1.*

v1.14.0
v1.14.1
v1.14.2
v1.14.3
v1.14.4
v1.14.5
v1.14.6
v1.14.7
v1.15.0
v1.15.1