CVE-2025-59824

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-59824
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-59824.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-59824
Aliases
Published
2025-09-24T20:15:33Z
Modified
2025-09-27T08:46:06.218821Z
Summary
[none]
Details

Omni manages Kubernetes on bare metal, virtual machines, or in a cloud. Prior to version 0.48.0, Omni Wireguard SideroLink has the potential to escape. Omni and each Talos machine establish a peer-to-peer (P2P) SideroLink connection using WireGuard to mutually authenticate and authorize access. The WireGuard interface on Omni is configured to ensure that the source IP address of an incoming packet matches the IPv6 address assigned to the Talos peer. However, it performs no validation on the packet's destination address. The Talos end of the SideroLink connection cannot be considered a trusted environment. Workloads running on Kubernetes, especially those configured with host networking, could gain direct access to this link. Therefore, a malicious workload could theoretically send arbitrary packets over the SideroLink interface. This issue has been patched in version 0.48.0.

References

Affected packages

Git / github.com/siderolabs/omni

Affected ranges

Type
GIT
Repo
https://github.com/siderolabs/omni
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.33.0-beta.0
v0.34.0-beta.0
v0.35.0-beta.0
v0.36.0-beta.0
v0.37.0-beta.0
v0.38.0-beta.0
v0.39.0-beta.0
v0.40.0-beta.0
v0.41.0-beta.0
v0.42.0-beta.0
v0.43.0
v0.43.0-beta.0
v0.44.0-beta.0
v0.45.0-beta.0
v0.46.0-beta.0
v0.47.0-beta.0
v0.47.0-beta.1