Skip to main content
HIGH7.2CVE-2024-28248GHSA-68mj-9pjq-mc85
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
Affected projects
cilium
Disclosed
Last updated

Affected versions

ProjectVulnerable range
Cilium>= 1.13.9, < 1.13.13
Cilium>= 1.14.0, < 1.14.8
Cilium>= 1.15.0, < 1.15.2

Patched versions

ProjectFixed in
Cilium1.13.13
Cilium1.14.8
Cilium1.15.2

References

Summary

Cilium's HTTP policies were not consistently applied to all traffic in the scope of the policies, leading to HTTP traffic being incorrectly and intermittently forwarded when it should have been dropped.

Impact

Any cluster relying on Cilium HTTP-layer enforcement to block requests — for example, restricting which HTTP paths or methods a workload may reach — could see those rules bypassed for some flows. The CVSS scope change indicates traffic that was supposed to be denied could traverse beyond the intended boundary. Operators using HTTP-aware policy as a primary security control should treat this as a defence-in-depth failure for the affected versions.

Detection

There is no specific log signature for the bypass; the failure is intermittent and policy-engine-internal. Operators on affected versions should assume HTTP-layer enforcement was incomplete and reason about the blast radius using L3/L4 policy and other controls. Compare HTTP request counts at the workload level (via Hubble or your service mesh) against expected policy outcomes — sustained anomalies for the affected period suggest exposure.

Mitigation

Upgrade to a patched version on the appropriate release line:

  • Cilium v1.15.2 or later (for the 1.15 line)
  • Cilium v1.14.8 or later (for the 1.14 line)
  • Cilium v1.13.13 or later (for the 1.13 line)

There is no workaround — affected users are strongly encouraged to upgrade.

References