
CVE-2025-23047 – Cilium vulnerable to information leakage via insecure default Hubble UI CORS header
https://notcve.org/view.php?id=CVE-2025-23047
22 Jan 2025 — Cilium is a networking, observability, and security solution with an eBPF-based dataplane. An insecure default `Access-Control-Allow-Origin` header value could lead to sensitive data exposure for users of Cilium versions 1.14.0 through 1.14.7, 1.15.0 through 1.15.11, and 1.16.0 through 1.16.4 who deploy Hubble UI using either Cilium CLI or via the Cilium Helm chart. A user with access to a Hubble UI instance affected by this issue could leak configuration details about the Kubernetes cluster which Hubble UI... • https://github.com/cilium/cilium/commit/a3489f190ba6e87b5336ee685fb6c80b1270d06d • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2025-23028 – DoS in Cilium agent DNS proxy from crafted DNS responses
https://notcve.org/view.php?id=CVE-2025-23028
22 Jan 2025 — Cilium is a networking, observability, and security solution with an eBPF-based dataplane. A denial of service vulnerability affects versions 1.14.0 through 1.14.7, 1.15.0 through 1.15.11, and 1.16.0 through 1.16.4. In a Kubernetes cluster where Cilium is configured to proxy DNS traffic, an attacker can crash Cilium agents by sending a crafted DNS response to workloads from outside the cluster. For traffic that is allowed but without using DNS-based policy, the dataplane will continue to pass traffic as con... • https://github.com/cilium/cilium/pull/36252 • CWE-770: Allocation of Resources Without Limits or Throttling •

CVE-2024-52529 – Layer 7 policy enforcement may not occur in policies with wildcarded port ranges in Cilium
https://notcve.org/view.php?id=CVE-2024-52529
25 Nov 2024 — Cilium is a networking, observability, and security solution with an eBPF-based dataplane. For users with the following configuration: 1. An allow policy that selects a Layer 3 destination and a port range `AND` 2. A Layer 7 allow policy that selects a specific port within the first policy's range the Layer 7 enforcement would not occur for the traffic selected by the Layer 7 policy. This issue only affects users who use Cilium's port range functionality, which was introduced in Cilium v1.16. • https://github.com/cilium/cilium/pull/35150 • CWE-755: Improper Handling of Exceptional Conditions •

CVE-2024-42486 – Cilium vulnerable to information leakage via incorrect ReferenceGrant update logic in Gateway API
https://notcve.org/view.php?id=CVE-2024-42486
16 Aug 2024 — Cilium is a networking, observability, and security solution with an eBPF-based dataplane. In versions on the 1.15.x branch prior to 1.15.8 and the 1.16.x branch prior to 1.16.1, ReferenceGrant changes are not correctly propagated in Cilium's GatewayAPI controller, which could lead to Gateway resources being able to access secrets for longer than intended, or to Routes having the ability to forward traffic to backends in other namespaces for longer than intended. This issue has been patched in Cilium v1.15.... • https://github.com/cilium/cilium/commit/ed3dfa0aab8b80f7e841a6d49d2a990ac2dca053 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2024-42487 – Cilium's Gateway API route matching order contradicts specification
https://notcve.org/view.php?id=CVE-2024-42487
15 Aug 2024 — Cilium is a networking, observability, and security solution with an eBPF-based dataplane. In the 1.15 branch prior to 1.15.8 and the 1.16 branch prior to 1.16.1, Gateway API HTTPRoutes and GRPCRoutes do not follow the match precedence specified in the Gateway API specification. In particular, request headers are matched before request methods, when the specification describes that the request methods must be respected before headers are matched. This could result in unexpected behaviour with security This ... • https://github.com/cilium/cilium/security/advisories/GHSA-qcm3-7879-xcww • CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting') •