Miggo Logo

CVE-2023-27594: Potential network policy bypass when routing IPv6 traffic

4.2

CVSS Score
3.1

Basic Information

EPSS Score
0.11752%
Published
3/17/2023
Updated
3/24/2023
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/cilium/ciliumgo< 1.11.151.11.15
github.com/cilium/ciliumgo>= 1.12.0, < 1.12.81.12.8
github.com/cilium/ciliumgo>= 1.13.0, < 1.13.11.13.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from incorrect source IP attribution in IPv6 NodePort handling. The Cilium release notes for patched versions reference fixes to 'remote-node identity classification' (PR #23091) and connectivity issues in IPv6+KPR scenarios (PR #23857). These imply flaws in BPF datapath logic where external IPv6 traffic was misidentified as originating from the host. The handle_ipv6 and ipv6_send_from_netdev functions are core to IPv6 packet processing and align with the described misattribution mechanism. The 'high' confidence for handle_ipv6 stems from direct references to identity classification fixes, while ipv6_send_from_netdev is inferred from NodePort flow handling.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

## Imp**t Un**r sp**i*i* *on*itions, *ilium m*y mis*ttri*ut* t** sour** IP ***r*ss o* tr***i* to * *lust*r, i**nti*yin* *xt*rn*l tr***i* *s *omin* *rom t** *ost on w*i** *ilium is runnin*. *s * *ons*qu*n**, n*twork poli*i*s *or t**t *lust*r mi**t **

Reasoning

T** vuln*r**ility st*ms *rom in*orr**t sour** IP *ttri*ution in IPv* No**Port **n*lin*. T** *ilium r*l**s* not*s *or p*t**** v*rsions r***r*n** *ix*s to 'r*mot*-no** i**ntity *l*ssi*i**tion' (PR #*****) *n* *onn**tivity issu*s in IPv*+KPR s**n*rios (