Cleartext Transmission of Sensitive Information Affecting cilium-fips-1.16-container-init-compat package, versions <1.16.17-r0


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.01% (1st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-MINIMOSLATEST-CILIUMFIPS116CONTAINERINITCOMPAT-14114706
  • published26 Nov 2025
  • disclosed21 Apr 2025

Introduced: 21 Apr 2025

CVE-2025-32793  (opens in a new tab)
CWE-319  (opens in a new tab)
CWE-362  (opens in a new tab)

How to fix?

Upgrade Minimos:latest cilium-fips-1.16-container-init-compat to version 1.16.17-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream cilium-fips-1.16-container-init-compat package and not the cilium-fips-1.16-container-init-compat package as distributed by Minimos. See How to fix? for Minimos:latest relevant fixed versions and status.

Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Versions 1.15.0 to 1.15.15, 1.16.0 to 1.16.8, and 1.17.0 to 1.17.2, are vulnerable when using Wireguard transparent encryption in a Cilium cluster, packets that originate from a terminating endpoint can leave the source node without encryption due to a race condition in how traffic is processed by Cilium. This issue has been patched in versions 1.15.16, 1.16.9, and 1.17.3. There are no workarounds available for this issue.

CVSS Base Scores

version 3.1