Unprotected Alternate Channel Affecting github.com/slackhq/nebula package, versions >=1.9.4 <1.9.7


Severity

Recommended
0.0
low
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMSLACKHQNEBULA-13671312
  • published23 Oct 2025
  • disclosed23 Oct 2025
  • creditGary Guo

Introduced: 23 Oct 2025

NewCVE-2025-62820  (opens in a new tab)
CWE-420  (opens in a new tab)

How to fix?

Upgrade github.com/slackhq/nebula to version 1.9.7 or higher.

Overview

github.com/slackhq/nebula is a scalable overlay networking tool with a focus on performance, simplicity and security.

Affected versions of this package are vulnerable to Unprotected Alternate Channel via improper handling of CIDR configuration in certificates. An attacker with control over a network node can bypass restrictions by sending packets with arbitrary source IP addresses within the network. Successful exploitation of this vulnerability allows for IP spoofing, sending arbitrary UDP packets to services, or disrupting traffic by sending TCP RST packets.

CVSS Base Scores

version 4.0
version 3.1