CVE-2024-37307 — Cilium is a networking, observability, and security solution with an eBPF-based
Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Starting in version 1.13.0 and prior to versions 1.13.7, 1.14.12, and 1.15.6, the output of `cilium-bugtool` can contain sensitive data when the tool is run (with the `--envoy-dump` flag se
Published
2024-06-13T16:09:22.378Z
Last modified
2024-08-19T17:04:31.162Z
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
01What is this vulnerability?
Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Starting in version 1.13.0 and prior to versions 1.13.7, 1.14.12, and 1.15.6, the output of `cilium-bugtool` can contain sensitive data when the tool is run (with the `--envoy-dump` flag set) against Cilium deployments with the Envoy proxy enabled. Users of the TLS inspection, Ingress with TLS termination…
02Affected products
| Vendor | Product | Versions |
|---|
| cilium | cilium | >= 1.13.0, < 1.13.17, >= 1.14.0, < 1.14.12, >= 1.15.0, < 1.15.6 |
03Active exploitation status
Not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. EPSS is the best forward-looking signal — see the EPSS row above.
04Recommended remediation
- Patch to a fixed version listed in the vendor advisory (see references below).
- Mitigate with WAF rules, network egress filters, or feature flags where the patch is not yet available.
- Hunt historical logs for exploitation indicators — see Detection signatures below.
05Technical details
For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.
06Detection signatures
Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:
Open in Sigma generator →
07Related CVEs
No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.
08Timeline
- Published: 2024-06-13T16:09:22.378Z
- Last modified: 2024-08-19T17:04:31.162Z
09References
- github.com — https://github.com/cilium/cilium/security/advisories/GHSA-wh78-7948-358j
- github.com — https://github.com/cilium/cilium/commit/0191b1ebcfdd61cefd06da0315a0e7d504167407
- github.com — https://github.com/cilium/cilium/commit/224e288a5bf40d0bb0f16c9413693b319633431a
- github.com — https://github.com/cilium/cilium/commit/9299c0fd0024e33397cffc666ff851e82af28741
- github.com — https://github.com/cilium/cilium/commit/958d7b77274bf2c272d8cdfd812631d644250653
- github.com — https://github.com/cilium/cilium/commit/9eb25ba40391a9b035d7e66401b862818f4aac4b
- github.com — https://github.com/cilium/cilium/commit/bf9a1ae1b2d2b2c9cca329d7aa96aa4858032a61
Want this in your SOAR or SIEM?
SARA's API returns EPSS, CVSS, KEV, and an analyst-grade summary in one call.
Read the API reference →