Cleartext Transmission of Sensitive Information Affecting cilium-fips-1.16-operator-generic package, versions <1.16.17-r0


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.01% (1st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-MINIMOSLATEST-CILIUMFIPS116OPERATORGENERIC-14114712
  • published26 Nov 2025
  • disclosed21 Apr 2025

Introduced: 21 Apr 2025

CVE-2025-32793  (opens in a new tab)
CWE-319  (opens in a new tab)
CWE-362  (opens in a new tab)

How to fix?

Upgrade Minimos:latest cilium-fips-1.16-operator-generic to version 1.16.17-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream cilium-fips-1.16-operator-generic package and not the cilium-fips-1.16-operator-generic package as distributed by Minimos. See How to fix? for Minimos:latest relevant fixed versions and status.

Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Versions 1.15.0 to 1.15.15, 1.16.0 to 1.16.8, and 1.17.0 to 1.17.2, are vulnerable when using Wireguard transparent encryption in a Cilium cluster, packets that originate from a terminating endpoint can leave the source node without encryption due to a race condition in how traffic is processed by Cilium. This issue has been patched in versions 1.15.16, 1.16.9, and 1.17.3. There are no workarounds available for this issue.

CVSS Base Scores

version 3.1