Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea

0
High
VulnerabilityCVE-2026-25804cvecve-2026-25804cwe-287cwe-770
Published: Fri Feb 06 2026 (02/06/2026, 22:58:35 UTC)
Source: CVE Database V5
Vendor/Project: antrea-io
Product: antrea

Description

Antrea is a Kubernetes networking solution intended to be Kubernetes native. Prior to versions 2.3.2 and 2.4.3, Antrea's network policy priority assignment system has a uint16 arithmetic overflow bug that causes incorrect OpenFlow priority calculations when handling a large numbers of policies with various priority values. This results in potentially incorrect traffic enforcement. This issue has been patched in versions 2.4.3.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 12:14:12 UTC

Technical Analysis

CVE-2026-25804 is a vulnerability in Antrea, an open-source Kubernetes networking solution designed to be Kubernetes native. The issue stems from a uint16 arithmetic overflow in the network policy priority assignment mechanism. Antrea uses OpenFlow rules to enforce network policies, assigning priorities to these rules to determine traffic handling order. When a large number of policies with varying priority values are processed, the uint16 overflow causes incorrect priority calculations. This miscalculation can lead to improper enforcement of network policies, allowing unauthorized traffic flows or blocking legitimate ones. The vulnerability affects Antrea versions before 2.3.2 and versions from 2.4.0 up to 2.4.3, with the fix implemented in 2.4.3. The CVSS 4.0 base score is 8.0 (high), reflecting the vulnerability's remote exploitability without authentication or user interaction, and its significant impact on confidentiality and integrity. The vulnerability is categorized under CWE-287 (Improper Authentication) and CWE-770 (Allocation of Resources Without Limits or Throttling), indicating that the flaw arises from improper handling of priority values leading to overflow and incorrect access control enforcement. No known exploits have been reported yet, but the potential for bypassing network segmentation controls in Kubernetes environments is a serious concern. This vulnerability could be exploited by attackers to circumvent network policies, potentially enabling lateral movement, data exfiltration, or denial of service within Kubernetes clusters.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the security of Kubernetes-based infrastructure. Many enterprises and cloud providers in Europe rely on Kubernetes for container orchestration, and Antrea is a popular CNI (Container Network Interface) plugin in these environments. Incorrect enforcement of network policies can lead to unauthorized access between pods, exposing sensitive data and critical services. This undermines confidentiality and integrity, potentially allowing attackers to move laterally within clusters or disrupt services. Critical sectors such as finance, healthcare, telecommunications, and government services, which increasingly depend on Kubernetes for scalable and secure deployments, are particularly vulnerable. The vulnerability's remote exploitability without authentication increases the attack surface, especially in multi-tenant or hybrid cloud environments common in Europe. Failure to patch could result in regulatory compliance issues under GDPR and other data protection laws due to potential data breaches.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately upgrade Antrea to version 2.4.3 or later, where the overflow bug is fixed. Prior to upgrading, audit existing network policies to identify unusually large or complex priority configurations that might trigger the overflow. Implement strict change management and monitoring of network policy deployments to detect anomalous traffic flows indicative of policy bypass. Employ network segmentation and zero-trust principles at multiple layers to reduce reliance on a single enforcement mechanism. Consider deploying runtime security tools that monitor Kubernetes network traffic for policy violations. Additionally, maintain up-to-date Kubernetes and CNI plugin versions, and subscribe to vendor security advisories. For environments where immediate upgrade is not feasible, restrict access to the Kubernetes API and control plane to trusted administrators and networks to reduce exploitation risk. Finally, document and test incident response plans for potential network policy breaches.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-05T19:58:01.641Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69867278f9fa50a62f39d4f2

Added to database: 2/6/2026, 11:00:08 PM

Last enriched: 2/14/2026, 12:14:12 PM

Last updated: 3/23/2026, 8:46:00 PM

Views: 104

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses