Impact
The vulnerability allows the cilium-bugtool debugging utility to include sensitive information in the generated archive when WireGuard encryption is enabled on Cilium deployments. The compromised data set can contain configuration details, key material, or other confidential information that is not intended for external distribution. The impact is a breach of confidentiality for any stakeholders who may obtain the archive, such as administrators or third‑party auditors.
Affected Systems
The issue affects the Cilium networking, observability, and security platform. Versions prior to 1.17.15, 1.18.9, and 1.19.3 are impacted; the issue was patched in the corresponding releases.
Risk and Exploitability
The CVSS score of 7.9 indicates high severity. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. Exploitation likely requires local or privileged access to execute cilium-bugtool, as the tool must be run on a node within the Cilium cluster. The risk is thus significant for environments where cluster administrators can run debugging utilities on encrypted deployments.
OpenCVE Enrichment
Github GHSA