Denial of service via Kubernetes annotations in specific Cilium configurations
CVE-2023-41332

3.5LOW

Key Information:

Vendor

Cilium

Status
Vendor
CVE Published:
27 September 2023

What is CVE-2023-41332?

Cilium is a networking, observability, and security solution with an eBPF-based dataplane. In Cilium clusters where Cilium's Layer 7 proxy has been disabled, creating workloads with policy.cilium.io/proxy-visibility annotations (in Cilium >= v1.13) or io.cilium.proxy-visibility annotations (in Cilium <= v1.12) causes the Cilium agent to segfault on the node to which the workload is assigned. Existing traffic on the affected node will continue to flow, but the Cilium agent on the node will not able to process changes to workloads running on the node. This will also prevent workloads from being able to start on the affected node. The denial of service will be limited to the node on which the workload is scheduled, however an attacker may be able to schedule workloads on the node of their choosing, which could lead to targeted attacks. This issue has been resolved in Cilium versions 1.14.2, 1.13.7, and 1.12.14. Users unable to upgrade can avoid this denial of service attack by enabling the Layer 7 proxy.

Affected Version(s)

cilium >= 1.14.0, < 1.14.2 < 1.14.0, 1.14.2

cilium >= 1.13.0, < 1.13.7 < 1.13.0, 1.13.7

cilium < 1.12.14 < 1.12.14

References

CVSS V3.1

Score:
3.5
Severity:
LOW
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2023-41332 : Denial of service via Kubernetes annotations in specific Cilium configurations