The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade github.com/cilium/cilium/operator/pkg/gateway-api
to version 1.15.8, 1.16.1 or higher.
Affected versions of this package are vulnerable to Information Exposure due to incorrect ReferenceGrant
update logic in the Gateway API. An attacker can access secrets in other namespaces by exploiting the delay in propagating changes to ReferenceGrants
, allowing unauthorized access to sensitive information.
Note: This is only exploitable if the associated ReferenceGrant has been revoked, but the changes have not yet been propagated.
This vulnerability can be mitigated by modifying any related Gateway/HTTPRoute/GRPCRoute/TCPRoute CRD, such as adding any label to these resources, which will trigger a reconciliation of ReferenceGrants on an affected cluster.