Cilium is open source software for providing and securing network connectivity and loadbalancing between application workloads. Prior to versions 1.9.16, 1.10.11, and 1.11.15, if an attacker is able to perform a container escape of a container running as root on a host where Cilium is installed, the attacker can escalate privileges to cluster admin by using Cilium's Kubernetes service account. The problem has been fixed and the patch is available in versions 1.9.16, 1.10.11, and 1.11.5. There are no known workarounds available.
History

Wed, 23 Apr 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2022-05-20T18:30:12.000Z

Updated: 2025-04-23T18:24:28.294Z

Reserved: 2022-04-13T00:00:00.000Z

Link: CVE-2022-29179

cve-icon Vulnrichment

Updated: 2024-08-03T06:17:54.139Z

cve-icon NVD

Status : Modified

Published: 2022-05-20T19:15:08.137

Modified: 2024-11-21T06:58:39.103

Link: CVE-2022-29179

cve-icon Redhat

No data.