Summary
When run in debug mode, Cilium may log sensitive information. The agent will log the values of HTTP headers if they match HTTP network policy rules. In addition, Cilium 1.12.x before 1.12.9 and 1.13.x before 1.13.2 running in debug mode can log secrets used by the Cilium agent — including TLS private keys for Ingress and GatewayAPI resources, depending on cluster configuration.
Impact
Anything an HTTP-aware policy inspects (including Authorization headers, Cookies, custom auth tokens) ends up in plaintext in the Cilium agent log. On 1.12 / 1.13, TLS private keys for Ingress and GatewayAPI resources are logged at agent restart, when the secrets are modified, and on creation of Ingress or GatewayAPI resources. Anyone with read access to those logs (operators, log aggregators, SIEM tenants, support archives) effectively has the credentials and TLS material they reveal.
Detection
Audit Cilium agent logs from affected versions while debug mode was enabled. Look for HTTP header dumps, references to PEM blocks, and TLS Secret-related log lines around Ingress / GatewayAPI changes. Confirm whether your cluster ran with debug.enabled=true (Helm values) or --debug on cilium-agent.
Mitigation
Upgrade to a patched version: 1.13.2, 1.12.9, or 1.11.16 (or later on the matching line).
Workaround: disable debug mode until upgrade is possible. After upgrade, rotate any TLS keys that were exposed via debug logs on 1.12 / 1.13, and rotate any secrets that may have appeared in HTTP headers logged during the affected period.