We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-30162

East-west traffic not subject to egress policy enforcement for requests via Gateway API load balancers



Description

Cilium is a networking, observability, and security solution with an eBPF-based dataplane. For Cilium users who use Gateway API for Ingress for some services and use LB-IPAM or BGP for LB Service implementation and use network policies to block egress traffic from workloads in a namespace to workloads in other namespaces, egress traffic from workloads covered by such network policies to LoadBalancers configured by `Gateway` resources will incorrectly be allowed. LoadBalancer resources not deployed via a Gateway API configuration are not affected by this issue. This issue affects: Cilium v1.15 between v1.15.0 and v1.15.14 inclusive, v1.16 between v1.16.0 and v1.16.7 inclusive, and v1.17 between v1.17.0 and v1.17.1 inclusive. This issue is fixed in Cilium v1.15.15, v1.16.8, and v1.17.2. A Clusterwide Cilium Network Policy can be used to work around this issue for users who are unable to upgrade.

Reserved 2025-03-17 | Published 2025-03-24 | Updated 2025-03-24 | Assigner GitHub_M


LOW: 3.2CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N

Problem types

CWE-863: Incorrect Authorization

Product status

>= 1.16.0, < 1.16.8
affected

>= 1.17.0, < 1.17.2
affected

>= 1.15.0, < 1.15.15
affected

References

github.com/...cilium/security/advisories/GHSA-24qp-4xx8-3jvj

github.com/cilium/proxy/pull/1172

docs.cilium.io/en/stable/network/lb-ipam

cve.org (CVE-2025-30162)

nvd.nist.gov (CVE-2025-30162)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-30162

Support options

Helpdesk Chat, Email, Knowledgebase