CVE-2025-32793

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-32793
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-32793.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-32793
Aliases
Downstream
Related
Published
2025-04-21T15:34:14Z
Modified
2025-11-11T02:56:21.744058Z
Severity
  • 4.0 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N CVSS Calculator
Summary
Cilium packets from terminating endpoints may not be encrypted in Wireguard-enabled clusters
Details

Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Versions 1.15.0 to 1.15.15, 1.16.0 to 1.16.8, and 1.17.0 to 1.17.2, are vulnerable when using Wireguard transparent encryption in a Cilium cluster, packets that originate from a terminating endpoint can leave the source node without encryption due to a race condition in how traffic is processed by Cilium. This issue has been patched in versions 1.15.16, 1.16.9, and 1.17.3. There are no workarounds available for this issue.

Database specific
{
    "cwe_ids": [
        "CWE-319"
    ]
}
References

Affected packages

Git / github.com/cilium/cilium

Affected ranges

Type
GIT
Repo
https://github.com/cilium/cilium
Events
Database specific
{
    "versions": [
        {
            "introduced": "v1.13.0"
        },
        {
            "fixed": "v1.15.16"
        }
    ]
}
Type
GIT
Repo
https://github.com/cilium/cilium
Events
Database specific
{
    "versions": [
        {
            "introduced": "v1.16.0"
        },
        {
            "fixed": "v1.16.9"
        }
    ]
}
Type
GIT
Repo
https://github.com/cilium/cilium
Events
Database specific
{
    "versions": [
        {
            "introduced": "v1.17.0"
        },
        {
            "fixed": "v1.17.3"
        }
    ]
}

Affected versions

1.*

1.16.0
1.16.1
1.16.2
1.16.3
1.16.4
1.16.5
1.16.6
1.16.7
1.16.8
1.17.0
1.17.1
1.17.2

v1.*

v1.16.0
v1.16.1
v1.16.2
v1.16.3
v1.16.4
v1.16.5
v1.16.6
v1.16.7
v1.16.8
v1.17.0
v1.17.1
v1.17.2