Impact
A flaw in Antrea caused the IPsec encryption layer to be skipped when IPv6 packets were sent between nodes in dual‑stack clusters. While IPv4 traffic was wrapped in ESP, IPv6 traffic traversed the network in plaintext. The vulnerability is a classic confidentiality loss that allows an adversary to read sensitive data flowing between pods, potentially enabling additional attacks. The weakness is recorded as CWE‑311, indicating a failure to encrypt data during transmission.
Affected Systems
The affected product is Antrea from antrea‑io. Versions prior to 2.4.5 (for branch 2.4) and prior to 2.5.2 (for branch 2.5) are vulnerable when trafficEncryptionMode is set to ipsec on a dual‑stack (IPv4/IPv6) cluster. Single‑stack IPv4 or IPv6 setups are not impacted.
Risk and Exploitability
The CVSS score of 7.1 signals a high‑severity issue that can be exploited from within the cluster or from a network that has visibility into node traffic. EPSS data is unavailable and the vulnerability is not listed in CISA’s KEV catalog, but the risk stems from the fact that the vulnerable traffic is unencrypted. Attackers would need network access to the inter‑node channels; once they can capture IPv6 packets, they obtain unencrypted data. No additional exploit conditions are required beyond the presence of a dual‑stack IPsec cluster.
OpenCVE Enrichment
Github GHSA