Impact
This vulnerability causes Cilium to fail to enforce host firewall policies when Native Routing, WireGuard and Node Encryption are enabled. Pods on different nodes can communicate through the dataplane, bypassing rules that are normally applied on the host, which could expose services or data to unauthorized pods. The weakness is a bypass of authorization checks, identified as CWE‑266 and CWE‑863.
Affected Systems
Cilium, versions 1.18.0 through 1.18.5, provide a networking and security solution that utilizes an eBPF dataplane. These releases are vulnerable when the native routing, WireGuard and node encryption features are enabled.
Risk and Exploitability
The vulnerability is scored 6.1 on CVSS, indicating moderate severity, with an EPSS score below 1%, showing a low likelihood of exploitation at this time. It is not listed in the CISA KEV catalog. The most likely attack vector is the cluster network; an attacker who can influence pod placement or configuration could exploit the flaw to create cross‑node traffic that should otherwise be blocked.
OpenCVE Enrichment
Github GHSA