Privilege Escalation Affecting github.com/cilium/cilium package, versions <1.9.16 >=1.10.0-rc0 <1.10.11 >=1.11.0-rc0 <1.11.5


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    EPSS
    0.04% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-GOLANG-GITHUBCOMCILIUMCILIUM-2849062
  • published 30 May 2022
  • disclosed 30 May 2022
  • credit Micah Hausler, Robert Clark, Yuval Avrahami, Shaul Ben Hai

How to fix?

Upgrade github.com/cilium/cilium to version 1.9.16, 1.10.11, 1.11.5 or higher.

Overview

github.com/cilium/cilium is an open source software for providing and transparently securing network connectivity and loadbalancing between application workloads such as application containers or processes.

Affected versions of this package are vulnerable to Privilege Escalation when an attacker is able to perform a container escape of a container running as root on a host where Cilium is installed. The attacker can leverage Cilium's Kubernetes service account to gain access to cluster privileges that are more permissive than what is minimally required to operate Cilium. Exploiting this vulnerability allows modification and deletion of Pod and Node resources.

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
7.5 high
  • Attack Vector (AV)
    Local
  • Attack Complexity (AC)
    High
  • Privileges Required (PR)
    High
  • User Interaction (UI)
    None
  • Scope (S)
    Changed
  • Confidentiality (C)
    High
  • Integrity (I)
    High
  • Availability (A)
    High
Expand this section

NVD

8.2 high