Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2026-26963

Summary
Assigner-GitHub_M
Assigner Org ID-a0819718-46f1-4df5-94e2-005712e83aaa
Published At-19 Feb, 2026 | 23:38
Updated At-20 Feb, 2026 | 15:36
Rejected At-
Credits

Cilium may not enforce host firewall policies when Native Routing, WireGuard and Node Encryption are enabled

Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Versions 1.18.0 through 1.18.5 will incorrectly permit traffic from Pods on other nodes when Native Routing, WireGuard and Node Encryption are enabled. This issue has been fixed in version 1.18.6.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:GitHub_M
Assigner Org ID:a0819718-46f1-4df5-94e2-005712e83aaa
Published At:19 Feb, 2026 | 23:38
Updated At:20 Feb, 2026 | 15:36
Rejected At:
â–¼CVE Numbering Authority (CNA)
Cilium may not enforce host firewall policies when Native Routing, WireGuard and Node Encryption are enabled

Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Versions 1.18.0 through 1.18.5 will incorrectly permit traffic from Pods on other nodes when Native Routing, WireGuard and Node Encryption are enabled. This issue has been fixed in version 1.18.6.

Affected Products
Vendor
cilium
Product
cilium
Versions
Affected
  • >= 1.18.0, < 1.18.6
Problem Types
TypeCWE IDDescription
CWECWE-863CWE-863: Incorrect Authorization
Type: CWE
CWE ID: CWE-863
Description: CWE-863: Incorrect Authorization
Metrics
VersionBase scoreBase severityVector
3.16.1MEDIUM
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
Version: 3.1
Base score: 6.1
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/cilium/cilium/security/advisories/GHSA-5r23-prx4-mqg3
x_refsource_CONFIRM
https://github.com/cilium/cilium/pull/42892
x_refsource_MISC
https://github.com/cilium/cilium/commit/88e28e1e62c0b1a02c3f0fc22d888ac9eefbe885
x_refsource_MISC
https://github.com/cilium/cilium/releases/tag/v1.18.6
x_refsource_MISC
Hyperlink: https://github.com/cilium/cilium/security/advisories/GHSA-5r23-prx4-mqg3
Resource:
x_refsource_CONFIRM
Hyperlink: https://github.com/cilium/cilium/pull/42892
Resource:
x_refsource_MISC
Hyperlink: https://github.com/cilium/cilium/commit/88e28e1e62c0b1a02c3f0fc22d888ac9eefbe885
Resource:
x_refsource_MISC
Hyperlink: https://github.com/cilium/cilium/releases/tag/v1.18.6
Resource:
x_refsource_MISC
â–¼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security-advisories@github.com
Published At:20 Feb, 2026 | 00:16
Updated At:20 Feb, 2026 | 20:12

Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Versions 1.18.0 through 1.18.5 will incorrectly permit traffic from Pods on other nodes when Native Routing, WireGuard and Node Encryption are enabled. This issue has been fixed in version 1.18.6.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.16.1MEDIUM
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
Primary3.15.4MEDIUM
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Type: Secondary
Version: 3.1
Base score: 6.1
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
Type: Primary
Version: 3.1
Base score: 5.4
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
CPE Matches

cilium
cilium
>>cilium>>Versions from 1.18.0(inclusive) to 1.18.6(exclusive)
cpe:2.3:a:cilium:cilium:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-863Primarysecurity-advisories@github.com
CWE ID: CWE-863
Type: Primary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/cilium/cilium/commit/88e28e1e62c0b1a02c3f0fc22d888ac9eefbe885security-advisories@github.com
Patch
https://github.com/cilium/cilium/pull/42892security-advisories@github.com
Issue Tracking
https://github.com/cilium/cilium/releases/tag/v1.18.6security-advisories@github.com
Release Notes
https://github.com/cilium/cilium/security/advisories/GHSA-5r23-prx4-mqg3security-advisories@github.com
Patch
Vendor Advisory
Hyperlink: https://github.com/cilium/cilium/commit/88e28e1e62c0b1a02c3f0fc22d888ac9eefbe885
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/cilium/cilium/pull/42892
Source: security-advisories@github.com
Resource:
Issue Tracking
Hyperlink: https://github.com/cilium/cilium/releases/tag/v1.18.6
Source: security-advisories@github.com
Resource:
Release Notes
Hyperlink: https://github.com/cilium/cilium/security/advisories/GHSA-5r23-prx4-mqg3
Source: security-advisories@github.com
Resource:
Patch
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

5Records found

CVE-2023-27594
Matching Score-6
Assigner-GitHub, Inc.
ShareView Details
Matching Score-6
Assigner-GitHub, Inc.
CVSS Score-4.2||MEDIUM
EPSS-0.05% / 14.79%
||
7 Day CHG~0.00%
Published-17 Mar, 2023 | 19:56
Updated-25 Feb, 2025 | 14:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cilium vulnerable to potential network policy bypass when routing IPv6 traffic

Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Prior to versions 1.11.15, 1.12.8, and 1.13.1, under specific conditions, Cilium may misattribute the source IP address of traffic to a cluster, identifying external traffic as coming from the host on which Cilium is running. As a consequence, network policies for that cluster might be bypassed, depending on the specific network policies enabled. This issue only manifests when Cilium is routing IPv6 traffic and NodePorts are used to route traffic to pods. IPv6 and endpoint routes are both disabled by default. The problem has been fixed and is available on versions 1.11.15, 1.12.8, and 1.13.1. As a workaround, disable IPv6 routing.

Action-Not Available
Vendor-ciliumcilium
Product-ciliumcilium
CWE ID-CWE-285
Improper Authorization
CWE ID-CWE-863
Incorrect Authorization
CVE-2025-30163
Matching Score-6
Assigner-GitHub, Inc.
ShareView Details
Matching Score-6
Assigner-GitHub, Inc.
CVSS Score-3.4||LOW
EPSS-0.05% / 14.08%
||
7 Day CHG~0.00%
Published-24 Mar, 2025 | 18:46
Updated-04 Sep, 2025 | 15:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Node based network policies may incorrectly allow workload traffic

Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Node based network policies (`fromNodes` and `toNodes`) will incorrectly permit traffic to/from non-node endpoints that share the labels specified in `fromNodes` and `toNodes` sections of network policies. Node based network policy is disabled by default in Cilium. This issue affects: Cilium v1.16 between v1.16.0 and v1.16.7 inclusive and v1.17 between v1.17.0 and v1.17.1 inclusive. This issue is fixed in Cilium v1.16.8 and v1.17.2. Users can work around this issue by ensuring that the labels used in `fromNodes` and `toNodes` fields are used exclusively by nodes and not by other endpoints.

Action-Not Available
Vendor-ciliumcilium
Product-ciliumcilium
CWE ID-CWE-863
Incorrect Authorization
CVE-2025-30162
Matching Score-6
Assigner-GitHub, Inc.
ShareView Details
Matching Score-6
Assigner-GitHub, Inc.
CVSS Score-3.2||LOW
EPSS-0.01% / 0.98%
||
7 Day CHG~0.00%
Published-24 Mar, 2025 | 18:44
Updated-04 Sep, 2025 | 15:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
East-west traffic not subject to egress policy enforcement for requests via Gateway API load balancers

Cilium is a networking, observability, and security solution with an eBPF-based dataplane. For Cilium users who use Gateway API for Ingress for some services and use LB-IPAM or BGP for LB Service implementation and use network policies to block egress traffic from workloads in a namespace to workloads in other namespaces, egress traffic from workloads covered by such network policies to LoadBalancers configured by `Gateway` resources will incorrectly be allowed. LoadBalancer resources not deployed via a Gateway API configuration are not affected by this issue. This issue affects: Cilium v1.15 between v1.15.0 and v1.15.14 inclusive, v1.16 between v1.16.0 and v1.16.7 inclusive, and v1.17 between v1.17.0 and v1.17.1 inclusive. This issue is fixed in Cilium v1.15.15, v1.16.8, and v1.17.2. A Clusterwide Cilium Network Policy can be used to work around this issue for users who are unable to upgrade.

Action-Not Available
Vendor-ciliumcilium
Product-ciliumcilium
CWE ID-CWE-863
Incorrect Authorization
CVE-2020-26555
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.4||MEDIUM
EPSS-0.20% / 42.18%
||
7 Day CHG+0.01%
Published-24 May, 2021 | 17:41
Updated-04 Nov, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B through 5.2 may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN.

Action-Not Available
Vendor-bluetoothn/aIntel CorporationFedora Project
Product-ac_9560ac_9560_firmwareac_3168ac_3165ax201_firmwareac_9260ac_7265ac_8260_firmwareac_3165_firmwarekiller_wi-fi_6e_ax1675_firmwareac_9461ac_8260killer_ac_1550_firmwareac_8265_firmwarekiller_ac_1550ac_9461_firmwareax210_firmwareac_3168_firmwareac_7265_firmwarekiller_wi-fi_6e_ax1675ax200_firmwareax200ac_9260_firmwareac_8265killer_wi-fi_6_ax1650ac_9462killer_wi-fi_6_ax1650_firmwareax201ac_9462_firmwarefedoraax210bluetooth_core_specificationn/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-7096
Matching Score-4
Assigner-WSO2 LLC
ShareView Details
Matching Score-4
Assigner-WSO2 LLC
CVSS Score-4.2||MEDIUM
EPSS-0.06% / 17.84%
||
7 Day CHG~0.00%
Published-30 May, 2025 | 14:54
Updated-03 Dec, 2025 | 08:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Privilege Escalation in Multiple WSO2 Products via SOAP Admin Service Due to Business Logic Flaw

A privilege escalation vulnerability exists in multiple WSO2 products due to a business logic flaw in SOAP admin services. A malicious actor can create a new user with elevated permissions only when all of the following conditions are met: * SOAP admin services are accessible to the attacker. * The deployment includes an internally used attribute that is not part of the default WSO2 product configuration. * At least one custom role exists with non-default permissions. * The attacker has knowledge of the custom role and the internal attribute used in the deployment. Exploiting this vulnerability allows malicious actors to assign higher privileges to self-registered users, bypassing intended access control mechanisms.

Action-Not Available
Vendor-WSO2 LLC
Product-open_banking_iamopen_banking_amopen_banking_kmapi_manageridentity_serveridentity_server_as_key_managerWSO2 Identity Server as Key ManagerWSO2 Open Banking AMWSO2 Open Banking IAMWSO2 API ManagerWSO2 Identity ServerWSO2 Open Banking KMWSO2 Enterprise Mobility Manager
CWE ID-CWE-863
Incorrect Authorization
Details not found