Cleartext Transmission of Sensitive Information Affecting cilium-1.14 package, versions <1.14.8-r0


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.05% (24th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CHAINGUARDLATEST-CILIUM114-6474518
  • published21 Mar 2024
  • disclosed18 Mar 2024

Introduced: 18 Mar 2024

CVE-2024-28249  (opens in a new tab)
CWE-319  (opens in a new tab)

How to fix?

Upgrade Chainguard cilium-1.14 to version 1.14.8-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream cilium-1.14 package and not the cilium-1.14 package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Prior to versions 1.13.13, 1.14.8, and 1.15.2, in Cilium clusters with IPsec enabled and traffic matching Layer 7 policies, IPsec-eligible traffic between a node's Envoy proxy and pods on other nodes is sent unencrypted and IPsec-eligible traffic between a node's DNS proxy and pods on other nodes is sent unencrypted. This issue has been resolved in Cilium 1.15.2, 1.14.8, and 1.13.13. There is no known workaround for this issue.

CVSS Scores

version 3.1