Cilium is open source software for providing and securing network connectivity and loadbalancing between application workloads. Prior to versions 1.9.16, 1.10.11, and 1.11.15, if an attacker is able to perform a container escape of a container running as root on a host where Cilium is installed, the attacker can escalate privileges to cluster admin by using Cilium's Kubernetes service account. The problem has been fixed and the patch is available in versions 1.9.16, 1.10.11, and 1.11.5. There are no known workarounds available.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-3809 Cilium is open source software for providing and securing network connectivity and loadbalancing between application workloads. Prior to versions 1.9.16, 1.10.11, and 1.11.15, if an attacker is able to perform a container escape of a container running as root on a host where Cilium is installed, the attacker can escalate privileges to cluster admin by using Cilium's Kubernetes service account. The problem has been fixed and the patch is available in versions 1.9.16, 1.10.11, and 1.11.5. There are no known workarounds available.
Github GHSA Github GHSA GHSA-fmrf-gvjp-5j5g Improper Privilege Management in Cilium
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00212}

epss

{'score': 0.00218}


Wed, 23 Apr 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-04-23T18:24:28.294Z

Reserved: 2022-04-13T00:00:00.000Z

Link: CVE-2022-29179

cve-icon Vulnrichment

Updated: 2024-08-03T06:17:54.139Z

cve-icon NVD

Status : Modified

Published: 2022-05-20T19:15:08.137

Modified: 2024-11-21T06:58:39.103

Link: CVE-2022-29179

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.