We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-32793

Cilium packets from terminating endpoints may not be encrypted in Wireguard-enabled clusters



Description

Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Versions 1.15.0 to 1.15.15, 1.16.0 to 1.16.8, and 1.17.0 to 1.17.2, are vulnerable when using Wireguard transparent encryption in a Cilium cluster, packets that originate from a terminating endpoint can leave the source node without encryption due to a race condition in how traffic is processed by Cilium. This issue has been patched in versions 1.15.16, 1.16.9, and 1.17.3. There are no workarounds available for this issue.

Reserved 2025-04-10 | Published 2025-04-21 | Updated 2025-04-21 | Assigner GitHub_M


MEDIUM: 4.0CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N

Problem types

CWE-319: Cleartext Transmission of Sensitive Information

Product status

>= v1.13.0, < v1.15.16
affected

>= v1.16.0, < v1.16.9
affected

>= v1.17.0, < v1.17.3
affected

References

github.com/...cilium/security/advisories/GHSA-5vxx-c285-pcq4

github.com/cilium/cilium/pull/38592

cve.org (CVE-2025-32793)

nvd.nist.gov (CVE-2025-32793)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-32793

Support options

Helpdesk Chat, Email, Knowledgebase