CVE-2026-33726

Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Prior to versions 1.17.14, 1.18.8, and 1.19.2, Ingress Network Policies are not enforced for traffic from pods to L7 Services (Envoy, GAMMA) with a local backend on the same node, when Per-Endpoint Routing is enabled and BPF Host Routing is disabled. Per-Endpoint Routing is disabled by default, but is automatically enabled in deployments using cloud IPAM, including Cilium ENI on EKS (`eni.enabled`), AlibabaCloud ENI (`alibabacloud.enabled`), Azure IPAM (`azure.enabled`, but not AKS BYOCNI), and some GKE deployments (`gke.enabled`; managed offerings such as GKE Dataplane V2 may use different defaults). It is typically not enabled in tunneled deployments, and chaining deployments are not affected. In practice, Amazon EKS with Cilium ENI mode is likely the most common affected environment. Versions 1.17.14, 1.18.8, and 1.19.2 contain a patch. There is currently no officially verified or comprehensive workaround for this issue. The only option would be to disable per-endpoint routes, but this will likely cause disruptions to ongoing connections, and potential conflicts if running in cloud providers.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cilium:cilium:*:*:*:*:*:*:*:*
cpe:2.3:a:cilium:cilium:*:*:*:*:*:*:*:*
cpe:2.3:a:cilium:cilium:*:*:*:*:*:*:*:*

History

01 Apr 2026, 15:53

Type Values Removed Values Added
CPE cpe:2.3:a:cilium:cilium:*:*:*:*:*:*:*:*
First Time Cilium
Cilium cilium
References () https://docs.cilium.io/en/stable/network/concepts/routing/#routing - () https://docs.cilium.io/en/stable/network/concepts/routing/#routing - Technical Description
References () https://docs.cilium.io/en/stable/network/kubernetes/policy/#network-policy - () https://docs.cilium.io/en/stable/network/kubernetes/policy/#network-policy - Technical Description
References () https://docs.cilium.io/en/stable/network/servicemesh/l7-traffic-management - () https://docs.cilium.io/en/stable/network/servicemesh/l7-traffic-management - Technical Description
References () https://docs.cilium.io/en/stable/operations/performance/tuning/#ebpf-host-routing - () https://docs.cilium.io/en/stable/operations/performance/tuning/#ebpf-host-routing - Technical Description
References () https://github.com/cilium/cilium/pull/44693 - () https://github.com/cilium/cilium/pull/44693 - Issue Tracking, Patch
References () https://github.com/cilium/cilium/security/advisories/GHSA-hxv8-4j4r-cqgv - () https://github.com/cilium/cilium/security/advisories/GHSA-hxv8-4j4r-cqgv - Patch, Vendor Advisory

30 Mar 2026, 13:26

Type Values Removed Values Added
Summary
  • (es) Cilium es una solución de red, observabilidad y seguridad con un plano de datos basado en eBPF. Antes de las versiones 1.17.14, 1.18.8 y 1.19.2, las políticas de red de entrada (Ingress Network Policies) no se aplican para el tráfico de pods a servicios L7 (Envoy, GAMMA) con un backend local en el mismo nodo, cuando el enrutamiento por punto final (Per-Endpoint Routing) está habilitado y el enrutamiento de host BPF (BPF Host Routing) está deshabilitado. El enrutamiento por punto final (Per-Endpoint Routing) está deshabilitado por defecto, pero se habilita automáticamente en implementaciones que utilizan IPAM en la nube, incluyendo Cilium ENI en EKS ('eni.enabled'), AlibabaCloud ENI ('alibabacloud.enabled'), Azure IPAM ('azure.enabled', pero no AKS BYOCNI), y algunas implementaciones de GKE ('gke.enabled'; las ofertas gestionadas como GKE Dataplane V2 pueden usar valores predeterminados diferentes). Normalmente no está habilitado en implementaciones con túneles, y las implementaciones en cadena no se ven afectadas. En la práctica, Amazon EKS con modo Cilium ENI es probablemente el entorno afectado más común. Las versiones 1.17.14, 1.18.8 y 1.19.2 contienen un parche. Actualmente no existe una solución alternativa oficialmente verificada o completa para este problema. La única opción sería deshabilitar las rutas por punto final, pero esto probablemente causará interrupciones en las conexiones en curso, y posibles conflictos si se ejecuta en proveedores de la nube.

27 Mar 2026, 01:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-27 01:16

Updated : 2026-04-01 15:53


NVD link : CVE-2026-33726

Mitre link : CVE-2026-33726

CVE.ORG link : CVE-2026-33726


JSON object : View

Products Affected

cilium

  • cilium
CWE
CWE-284

Improper Access Control

CWE-863

Incorrect Authorization