Home

Description

Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Prior to versions 1.16.17, 1.17.10, and 1.18.4, CiliumNetworkPolicys which use egress.toGroups.aws.securityGroupsIds to reference AWS security group IDs that do not exist or are not attached to any network interface may unintentionally allow broader outbound access than intended by the policy authors. In such cases, the toCIDRset section of the derived policy is not generated, which means outbound traffic may be permitted to more destinations than originally intended. This issue has been patched in versions 1.16.17, 1.17.10, and 1.18.4. There are no workarounds for this issue.

PUBLISHED Reserved 2025-11-10 | Published 2025-11-29 | Updated 2025-12-01 | Assigner GitHub_M




MEDIUM: 4.0CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-284: Improper Access Control

Product status

< 1.16.17
affected

>= 1.17.0, < 1.17.10
affected

>= 1.18.0, < 1.18.4
affected

References

github.com/...cilium/security/advisories/GHSA-38pp-6gcp-rqvm

github.com/...ommit/a385856b59c8289cc7273fa3a3062bbf0ef96c97

github.com/cilium/cilium/releases/tag/v1.16.17

github.com/cilium/cilium/releases/tag/v1.17.10

github.com/cilium/cilium/releases/tag/v1.18.4

cve.org (CVE-2025-64715)

nvd.nist.gov (CVE-2025-64715)

Download JSON