Improper Neutralization of Escape, Meta, or Control Sequences Affecting github.com/cilium/cilium/hubble/pkg/printer package, versions <1.17.2


Severity

Recommended
0.0
low
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.03% (8th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMCILIUMCILIUMHUBBLEPKGPRINTER-10188761
  • published21 May 2025
  • disclosed20 May 2025
  • creditbipierce-cisco, kokelley-cisco

Introduced: 20 May 2025

NewCVE-2025-48056  (opens in a new tab)
CWE-150  (opens in a new tab)

How to fix?

Upgrade github.com/cilium/cilium/hubble/pkg/printer to version 1.17.2 or higher.

Overview

Affected versions of this package are vulnerable to Improper Neutralization of Escape, Meta, or Control Sequences via the Hubble CLI terminal output processing. An attacker can manipulate the output to conceal log entries, rewrite output, or make the terminal temporarily unusable by injecting malicious control characters.

Note:

This is only exploitable if the victim is monitoring Kafka traffic using Layer 7 Protocol Visibility at the time of the attack.

Workaround

Users that are enabled to upgrade to the fixed version are advised to directing Hubble flows to a log file and inspecting the output within a text editor.

CVSS Base Scores

version 4.0
version 3.1