Skip to main content
HIGH7.2CVE-2023-29002GHSA-pg5p-wwp8-97g8
CVSS vector
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
Affected projects
cilium
Disclosed
Last updated

Affected versions

ProjectVulnerable range
Cilium1.7, 1.8, 1.9, 1.10, <= 1.11.15, <= 1.12.8, <= 1.13.1

Patched versions

ProjectFixed in
Cilium1.11.16, 1.12.9, 1.13.2

References

Summary

When run in debug mode, Cilium may log sensitive information. The agent will log the values of HTTP headers if they match HTTP network policy rules. In addition, Cilium 1.12.x before 1.12.9 and 1.13.x before 1.13.2 running in debug mode can log secrets used by the Cilium agent — including TLS private keys for Ingress and GatewayAPI resources, depending on cluster configuration.

Impact

Anything an HTTP-aware policy inspects (including Authorization headers, Cookies, custom auth tokens) ends up in plaintext in the Cilium agent log. On 1.12 / 1.13, TLS private keys for Ingress and GatewayAPI resources are logged at agent restart, when the secrets are modified, and on creation of Ingress or GatewayAPI resources. Anyone with read access to those logs (operators, log aggregators, SIEM tenants, support archives) effectively has the credentials and TLS material they reveal.

Detection

Audit Cilium agent logs from affected versions while debug mode was enabled. Look for HTTP header dumps, references to PEM blocks, and TLS Secret-related log lines around Ingress / GatewayAPI changes. Confirm whether your cluster ran with debug.enabled=true (Helm values) or --debug on cilium-agent.

Mitigation

Upgrade to a patched version: 1.13.2, 1.12.9, or 1.11.16 (or later on the matching line).

Workaround: disable debug mode until upgrade is possible. After upgrade, rotate any TLS keys that were exposed via debug logs on 1.12 / 1.13, and rotate any secrets that may have appeared in HTTP headers logged during the affected period.

References