Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-hxv8-4j4r-cqgv | Cilium L7 proxy may bypass Kubernetes NetworkPolicy for same-node traffic |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 27 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 27 Mar 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cilium
Cilium cilium |
|
| Vendors & Products |
Cilium
Cilium cilium |
Fri, 27 Mar 2026 04:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Prior to versions 1.17.14, 1.18.8, and 1.19.2, Ingress Network Policies are not enforced for traffic from pods to L7 Services (Envoy, GAMMA) with a local backend on the same node, when Per-Endpoint Routing is enabled and BPF Host Routing is disabled. Per-Endpoint Routing is disabled by default, but is automatically enabled in deployments using cloud IPAM, including Cilium ENI on EKS (`eni.enabled`), AlibabaCloud ENI (`alibabacloud.enabled`), Azure IPAM (`azure.enabled`, but not AKS BYOCNI), and some GKE deployments (`gke.enabled`; managed offerings such as GKE Dataplane V2 may use different defaults). It is typically not enabled in tunneled deployments, and chaining deployments are not affected. In practice, Amazon EKS with Cilium ENI mode is likely the most common affected environment. Versions 1.17.14, 1.18.8, and 1.19.2 contain a patch. There is currently no officially verified or comprehensive workaround for this issue. The only option would be to disable per-endpoint routes, but this will likely cause disruptions to ongoing connections, and potential conflicts if running in cloud providers. | |
| Title | Cilium L7 proxy may bypass Kubernetes NetworkPolicy for same-node traffic | |
| Weaknesses | CWE-284 CWE-863 |
|
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-27T13:50:24.672Z
Reserved: 2026-03-23T17:34:57.559Z
Link: CVE-2026-33726
Updated: 2026-03-27T13:24:24.487Z
Status : Received
Published: 2026-03-27T01:16:20.007
Modified: 2026-03-27T01:16:20.007
Link: CVE-2026-33726
No data.
OpenCVE Enrichment
Updated: 2026-03-27T09:22:34Z
Github GHSA