Sensitive Data Exposure in Cilium Due to `cilium-bugtool` Output
CVE-2024-37307

6.5MEDIUM

Key Information:

Vendor

Cilium

Status
Vendor
CVE Published:
13 June 2024

What is CVE-2024-37307?

Cilium, a networking and security solution, contains a vulnerability that results in the exposure of sensitive data when using the cilium-bugtool with the --envoy-dump flag enabled. This affects deployments utilizing the Envoy proxy where features such as TLS inspection, Ingress with TLS termination, and Kafka network policies with API key filtering are in use. The vulnerable versions include those prior to v1.15.6, v1.14.12, and v1.13.17. The sensitive data can encompass CA certificates, certificate chains, and private keys utilized by the Cilium Network Policies, as well as API keys linked to Kafka network policies. This is especially concerning as cilium-bugtool is typically invoked manually for debugging and does not operate as part of regular cluster functionality. This issue necessitates swift patching to mitigate potential risks to confidentiality.

Affected Version(s)

cilium >= 1.13.0, < 1.13.17 < 1.13.0, 1.13.17

cilium >= 1.14.0, < 1.14.12 < 1.14.0, 1.14.12

cilium >= 1.15.0, < 1.15.6 < 1.15.0, 1.15.6

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.