CVE-2023-27594: Potential network policy bypass when routing IPv6 traffic
4.2
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.11752%
CWE
Published
3/17/2023
Updated
3/24/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/cilium/cilium | go | < 1.11.15 | 1.11.15 |
| github.com/cilium/cilium | go | >= 1.12.0, < 1.12.8 | 1.12.8 |
| github.com/cilium/cilium | go | >= 1.13.0, < 1.13.1 | 1.13.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from incorrect source IP attribution in IPv6 NodePort handling. The Cilium release notes for patched versions reference fixes to 'remote-node identity classification' (PR #23091) and connectivity issues in IPv6+KPR scenarios (PR #23857). These imply flaws in BPF datapath logic where external IPv6 traffic was misidentified as originating from the host. The handle_ipv6 and ipv6_send_from_netdev functions are core to IPv6 packet processing and align with the described misattribution mechanism. The 'high' confidence for handle_ipv6 stems from direct references to identity classification fixes, while ipv6_send_from_netdev is inferred from NodePort flow handling.