Inadequate Encryption Strength Affecting github.com/cilium/cilium/pkg/datapath/linux/ipsec package, versions <1.13.14>=1.14.0 <1.14.9>=1.15.0 <1.15.3


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Inadequate Encryption Strength vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMCILIUMCILIUMPKGDATAPATHLINUXIPSEC-6509064
  • published28 Mar 2024
  • disclosed27 Mar 2024
  • creditDavid G.

Introduced: 27 Mar 2024

CVE-2024-28860  (opens in a new tab)
CWE-326  (opens in a new tab)

How to fix?

Upgrade github.com/cilium/cilium/pkg/datapath/linux/ipsec to version 1.13.14, 1.14.9, 1.15.3 or higher.

Overview

github.com/cilium/cilium/pkg/datapath/linux/ipsec is a provider of Linux datapath specific abstraction and useful helpers to manage IPSec via Linux xfrm.

Affected versions of this package are vulnerable to Inadequate Encryption Strength due to an ESP sequence number collision when multiple nodes are configured with the same key. An attacker can render the transparent encryption ineffective by chosen plaintext, key recovery, replay attacks through a man-in-the-middle approach.

Notes:

  1. This is only exploitable if multiple nodes are configured with the same key for IPsec tunnels.

  2. After upgrading, users must perform a key rotation using the instructions here to ensure that they are no longer vulnerable to this issue. Please note that the key rotation instructions have recently been updated, and users must use the new instructions to properly establish secure IPsec tunnels. To validate that the new instructions have been followed properly, ensure that the IPsec Kubernetes secret contains a "+" sign.

CVSS Scores

version 3.1