Miggo Logo

GHSA-wc5v-r48v-g4vh: Cilium host policy bypass in endpoint-routes mode with dual-stack

3.3

CVSS Score
3.1

Basic Information

CVE ID
-
EPSS Score
-
CWE
-
Published
7/15/2022
Updated
1/12/2023
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/cilium/ciliumgo< 1.10.131.10.13
github.com/cilium/ciliumgo>= 1.11.0, < 1.11.71.11.7

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from a typo in the BPF host firewall implementation where the wrong policy enforcement path was selected for dual-stack configurations. The commit diff shows the critical fix was changing CILIUM_CALL_IPV6_TO_HOST_POLICY_ONLY to CILIUM_CALL_IPV4_TO_HOST_POLICY_ONLY in the to_host_from_lxc function. This function handles traffic from pods to the host namespace, and the typo would cause misrouting of policy enforcement checks - particularly leaving IPv6 traffic unvalidated when it should have been subjected to host policies. The vulnerability manifests specifically when all four conditions are met (IPv4, IPv6, endpoint-routes, and host firewall enabled), as described in the advisory.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t T*is vuln*r**ility *llows *yp*ssin* *ost poli*i*s *or IPv* tr***i* *omin* *rom * *ilium-m*n**** po* *n* **stin** to t** *ost-n*twork n*m*sp*** (*.*., to * *ost-n*twork po*). *ost poli*y *n*or**m*nt on IPv* or *or tr***i* *omin* *rom outsi

Reasoning

T** vuln*r**ility st*ms *rom * typo in t** *P* *ost *ir*w*ll impl*m*nt*tion w**r* t** wron* poli*y *n*or**m*nt p*t* w*s s*l**t** *or *u*l-st**k *on*i*ur*tions. T** *ommit *i** s*ows t** *riti**l *ix w*s ***n*in* *ILIUM_**LL_IPV*_TO_*OST_POLI*Y_ONLY t