Skip to main content

CVE-2022-29178: CWE-276: Incorrect Default Permissions in cilium cilium

Medium
Published: Fri May 20 2022 (05/20/2022, 18:15:12 UTC)
Source: CVE
Vendor/Project: cilium
Product: cilium

Description

Cilium is open source software for providing and securing network connectivity and loadbalancing between application workloads. Cilium prior to versions 1.9.16, 1.10.11, and 1.11.15 contains an incorrect default permissions vulnerability. Operating Systems with users belonging to the group ID 1000 can access the API of Cilium via Unix domain socket available on the host where Cilium is running. This could allow malicious users to compromise integrity as well as system availability on that host. The problem has been fixed and the patch is available in versions 1.9.16, 1.10.11, and 1.11.5. A potential workaround is to modify Cilium's DaemonSet to run with a certain command, which can be found in the GitHub Security Advisory for this vulnerability.

AI-Powered Analysis

AILast updated: 06/23/2025, 08:36:20 UTC

Technical Analysis

CVE-2022-29178 is a vulnerability in Cilium, an open-source software widely used for providing and securing network connectivity and load balancing between application workloads, particularly in Kubernetes environments. The vulnerability arises from incorrect default permissions (CWE-276) set on the Unix domain socket used by Cilium's API on the host system. Specifically, on operating systems where users belong to the group ID 1000, these users can access the Cilium API via the Unix domain socket. This access is unintended and can allow malicious users to interfere with the integrity and availability of the host system. The vulnerability affects Cilium versions prior to 1.9.16, versions from 1.10.0 up to but not including 1.10.11, and versions from 1.11.0 up to but not including 1.11.5. The issue has been addressed in the fixed versions 1.9.16, 1.10.11, and 1.11.5. A temporary workaround involves modifying the Cilium DaemonSet configuration to run with specific commands as detailed in the GitHub Security Advisory. The vulnerability does not require user interaction but does require that the attacker has local user access to the host system with group ID 1000 membership. While no known exploits are currently reported in the wild, the flaw could allow unauthorized users to manipulate the Cilium API, potentially leading to compromised system integrity and denial of service conditions on the host.

Potential Impact

For European organizations, especially those operating Kubernetes clusters or cloud-native environments using Cilium for networking and security, this vulnerability poses a risk of local privilege escalation or unauthorized manipulation of network policies. An attacker with local access and group ID 1000 membership could exploit this to disrupt network connectivity, alter load balancing, or compromise the integrity of workloads running on the host. This could lead to service outages, data integrity issues, or lateral movement within the network. Organizations in sectors with high reliance on containerized infrastructure, such as finance, telecommunications, and critical infrastructure, may face operational disruptions or data breaches. Given the widespread adoption of Kubernetes and Cilium in European data centers and cloud environments, the vulnerability could impact availability and trustworthiness of services. However, since exploitation requires local access, the risk is somewhat mitigated in environments with strict access controls. Nonetheless, insider threats or compromised user accounts with group ID 1000 privileges could leverage this vulnerability to escalate attacks.

Mitigation Recommendations

European organizations should prioritize upgrading Cilium to versions 1.9.16, 1.10.11, or 1.11.5 or later to fully remediate the vulnerability. Until upgrades can be applied, administrators should implement the recommended workaround by modifying the Cilium DaemonSet to run with the specific command parameters outlined in the official GitHub Security Advisory to restrict socket permissions. Additionally, organizations should audit and restrict membership of group ID 1000 to trusted users only, minimizing the number of users who can access the vulnerable socket. Implementing strict host-level access controls and monitoring for unusual API access patterns on the Unix domain socket can help detect exploitation attempts. Network segmentation and limiting administrative access to Kubernetes nodes will further reduce risk. Regularly reviewing and hardening container runtime and orchestration security policies will also help mitigate potential lateral movement stemming from this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-04-13T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9843c4522896dcbf2f5b

Added to database: 5/21/2025, 9:09:23 AM

Last enriched: 6/23/2025, 8:36:20 AM

Last updated: 7/26/2025, 11:11:07 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats