Cleartext Transmission of Sensitive Information Affecting hubble-fips package, versions <1.17.2-r2


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.01% (1st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CHAINGUARDLATEST-HUBBLEFIPS-9804449
  • published25 Apr 2025
  • disclosed21 Apr 2025

Introduced: 21 Apr 2025

CVE-2025-32793  (opens in a new tab)
CWE-319  (opens in a new tab)

How to fix?

Upgrade Chainguard hubble-fips to version 1.17.2-r2 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream hubble-fips package and not the hubble-fips package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Versions 1.15.0 to 1.15.15, 1.16.0 to 1.16.8, and 1.17.0 to 1.17.2, are vulnerable when using Wireguard transparent encryption in a Cilium cluster, packets that originate from a terminating endpoint can leave the source node without encryption due to a race condition in how traffic is processed by Cilium. This issue has been patched in versions 1.15.16, 1.16.9, and 1.17.3. There are no workarounds available for this issue.