// For flags

CVE-2023-34242

Cilium vulnerable to information leakage via incorrect ReferenceGrant handling

Severity Score

5.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Prior to version 1.13.4, when Gateway API is enabled in Cilium, the absence of a check on the namespace in which a ReferenceGrant is created could result in Cilium unintentionally gaining visibility of secrets (including certificates) and services across namespaces. An attacker on an affected cluster can leverage this issue to use cluster secrets that should not be visible to them, or communicate with services that they should not have access to. Gateway API functionality is disabled by default. This vulnerability is fixed in Cilium release 1.13.4. As a workaround, restrict the creation of `ReferenceGrant` resources to admin users by using Kubernetes RBAC.

Cilium es una solución de red, observabilidad y seguridad con un plano de datos basado en eBPF. Antes de la versión 1.13.4, cuando la API de puerta de enlace está habilitada en Cilium, la ausencia de una comprobación en el espacio de nombres en el que se crea una "ReferenceGrant" podría dar lugar a que Cilium obtuviera involuntariamente visibilidad de secretos (incluidos certificados) y servicios a través de espacios de nombres. Un atacante en un clúster afectado puede aprovechar este problema para utilizar secretos de clúster que no deberían ser visibles para él, o comunicarse con servicios a los que no debería tener acceso. La funcionalidad "Gateway API" está desactivada por defecto. Esta vulnerabilidad se ha corregido en la versión 1.13.4 de Cilium. Como solución, restrinja la creación de recursos "ReferenceGrant" a los usuarios administradores mediante Kubernetes RBAC.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2023-05-31 CVE Reserved
  • 2023-06-15 CVE Published
  • 2024-12-11 CVE Updated
  • 2025-01-05 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cilium
Search vendor "Cilium"
Cilium
Search vendor "Cilium" for product "Cilium"
< 1.13.4
Search vendor "Cilium" for product "Cilium" and version " < 1.13.4"
-
Affected