Summary
Cilium's HTTP policies were not consistently applied to all traffic in the scope of the policies, leading to HTTP traffic being incorrectly and intermittently forwarded when it should have been dropped.
Impact
Any cluster relying on Cilium HTTP-layer enforcement to block requests — for example, restricting which HTTP paths or methods a workload may reach — could see those rules bypassed for some flows. The CVSS scope change indicates traffic that was supposed to be denied could traverse beyond the intended boundary. Operators using HTTP-aware policy as a primary security control should treat this as a defence-in-depth failure for the affected versions.
Detection
There is no specific log signature for the bypass; the failure is intermittent and policy-engine-internal. Operators on affected versions should assume HTTP-layer enforcement was incomplete and reason about the blast radius using L3/L4 policy and other controls. Compare HTTP request counts at the workload level (via Hubble or your service mesh) against expected policy outcomes — sustained anomalies for the affected period suggest exposure.
Mitigation
Upgrade to a patched version on the appropriate release line:
- Cilium v1.15.2 or later (for the 1.15 line)
- Cilium v1.14.8 or later (for the 1.14 line)
- Cilium v1.13.13 or later (for the 1.13 line)
There is no workaround — affected users are strongly encouraged to upgrade.