The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Inadequate Encryption Strength vulnerabilities in an interactive lesson.
Start learningUpgrade github.com/cilium/cilium/pkg/datapath/linux/ipsec
to version 1.13.14, 1.14.9, 1.15.3 or higher.
github.com/cilium/cilium/pkg/datapath/linux/ipsec is a provider of Linux datapath specific abstraction and useful helpers to manage IPSec via Linux xfrm.
Affected versions of this package are vulnerable to Inadequate Encryption Strength due to an ESP sequence number collision when multiple nodes are configured with the same key. An attacker can render the transparent encryption ineffective by chosen plaintext, key recovery, replay attacks through a man-in-the-middle approach.
Notes:
This is only exploitable if multiple nodes are configured with the same key for IPsec tunnels.
After upgrading, users must perform a key rotation using the instructions here to ensure that they are no longer vulnerable to this issue. Please note that the key rotation instructions have recently been updated, and users must use the new instructions to properly establish secure IPsec tunnels. To validate that the new instructions have been followed properly, ensure that the IPsec Kubernetes secret contains a "+" sign.