Cleartext Transmission of Sensitive Information Affecting hubble-fips package, versions <1.17.2-r2


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0% (1st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CHAINGUARDLATEST-HUBBLEFIPS-9804449
  • published25 Apr 2025
  • disclosed21 Apr 2025

Introduced: 21 Apr 2025

CVE-2025-32793  (opens in a new tab)
CWE-319  (opens in a new tab)
CWE-362  (opens in a new tab)

How to fix?

Upgrade Chainguard hubble-fips to version 1.17.2-r2 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream hubble-fips package and not the hubble-fips package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Versions 1.15.0 to 1.15.15, 1.16.0 to 1.16.8, and 1.17.0 to 1.17.2, are vulnerable when using Wireguard transparent encryption in a Cilium cluster, packets that originate from a terminating endpoint can leave the source node without encryption due to a race condition in how traffic is processed by Cilium. This issue has been patched in versions 1.15.16, 1.16.9, and 1.17.3. There are no workarounds available for this issue.

CVSS Base Scores

version 3.1