Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2025-59824

Опубликовано: 24 сент. 2025
Источник: nvd
CVSS3: 5.4
EPSS Низкий

Описание

Omni manages Kubernetes on bare metal, virtual machines, or in a cloud. Prior to version 0.48.0, Omni Wireguard SideroLink has the potential to escape. Omni and each Talos machine establish a peer-to-peer (P2P) SideroLink connection using WireGuard to mutually authenticate and authorize access. The WireGuard interface on Omni is configured to ensure that the source IP address of an incoming packet matches the IPv6 address assigned to the Talos peer. However, it performs no validation on the packet's destination address. The Talos end of the SideroLink connection cannot be considered a trusted environment. Workloads running on Kubernetes, especially those configured with host networking, could gain direct access to this link. Therefore, a malicious workload could theoretically send arbitrary packets over the SideroLink interface. This issue has been patched in version 0.48.0.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:siderolabs:omni:*:*:*:*:*:kubernetes:*:*
Версия до 0.48.0 (исключая)

EPSS

Процентиль: 13%
0.00044
Низкий

5.4 Medium

CVSS3

Дефекты

CWE-863

Связанные уязвимости

github
5 месяцев назад

Omni Wireguard SideroLink potential escape

EPSS

Процентиль: 13%
0.00044
Низкий

5.4 Medium

CVSS3

Дефекты

CWE-863