The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade github.com/cilium/cilium/bugtool/cmd
to version 1.13.17, 1.14.12, 1.15.6 or higher.
Affected versions of this package are vulnerable to Information Exposure through the cilium-bugtool
when the --envoy-dump
flag is used. An attacker can access sensitive data by exploiting this vulnerability.
Notes:
Users of the following features are affected:
TLS inspection
Ingress with TLS termination
Gateway API with TLS termination
Kafka network policies with API key filtering
The sensitive data includes:
The CA certificate, certificate chain, and private key used by Cilium HTTP Network Policies, and when using Ingress/Gateway API
The API keys used in Kafka-related network policy
cilium-bugtool
is a debugging tool that is typically invoked manually and does not run during the normal operation of a Cilium cluster.