Insecure Automated Optimizations Affecting github.com/cilium/cilium/pkg/policy package, versions >=1.14.0 <1.14.16>=1.15.0 <1.15.10


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (11th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMCILIUMCILIUMPKGPOLICY-8237189
  • published22 Oct 2024
  • disclosed21 Oct 2024
  • creditCasey Callendrello, christarazi, Jarno Rajahalme

Introduced: 21 Oct 2024

CVE-2024-47825  (opens in a new tab)
CWE-1038  (opens in a new tab)

How to fix?

Upgrade github.com/cilium/cilium/pkg/policy to version 1.14.16, 1.15.10 or higher.

Overview

github.com/cilium/cilium/pkg/policy is a package for eBPF-based Networking, Security, and Observability

Affected versions of this package are vulnerable to Insecure Automated Optimizations due to the interaction between broader CIDR deny policies and more specific CIDR allow policies. An attacker can bypass intended security restrictions if a narrower CIDR allow policy is configured and takes precedence over a broader CIDR deny policy.

Note:

This is only exploitable if enableDefaultDeny: false or - toEntities: all is specified in the narrower allow policy.

Workaround

This vulnerability can be mitigated by removing the enableDefaultDeny: false configuration option and explicitly defining any allow rules required. No workaround is available to users with egress policies that explicitly specify toEntities: all.

CVSS Scores

version 4.0
version 3.1