Incorrect Authorization Affecting cilium-fips-1.16-operator-aws package, versions <1.16.17-r0


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.03% (10th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Incorrect Authorization vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-MINIMOSLATEST-CILIUMFIPS116OPERATORAWS-14114587
  • published26 Nov 2025
  • disclosed24 Mar 2025

Introduced: 24 Mar 2025

CVE-2025-30163  (opens in a new tab)
CWE-863  (opens in a new tab)

How to fix?

Upgrade Minimos:latest cilium-fips-1.16-operator-aws to version 1.16.17-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream cilium-fips-1.16-operator-aws package and not the cilium-fips-1.16-operator-aws package as distributed by Minimos. See How to fix? for Minimos:latest relevant fixed versions and status.

Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Node based network policies (fromNodes and toNodes) will incorrectly permit traffic to/from non-node endpoints that share the labels specified in fromNodes and toNodes sections of network policies. Node based network policy is disabled by default in Cilium. This issue affects: Cilium v1.16 between v1.16.0 and v1.16.7 inclusive and v1.17 between v1.17.0 and v1.17.1 inclusive. This issue is fixed in Cilium v1.16.8 and v1.17.2. Users can work around this issue by ensuring that the labels used in fromNodes and toNodes fields are used exclusively by nodes and not by other endpoints.

CVSS Base Scores

version 3.1