CVE-2025-59824
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-24

Last updated on: 2025-09-26

Assigner: GitHub, Inc.

Description
Omni manages Kubernetes on bare metal, virtual machines, or in a cloud. Prior to version 0.48.0, Omni Wireguard SideroLink has the potential to escape. Omni and each Talos machine establish a peer-to-peer (P2P) SideroLink connection using WireGuard to mutually authenticate and authorize access. The WireGuard interface on Omni is configured to ensure that the source IP address of an incoming packet matches the IPv6 address assigned to the Talos peer. However, it performs no validation on the packet's destination address. The Talos end of the SideroLink connection cannot be considered a trusted environment. Workloads running on Kubernetes, especially those configured with host networking, could gain direct access to this link. Therefore, a malicious workload could theoretically send arbitrary packets over the SideroLink interface. This issue has been patched in version 0.48.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-24
Last Modified
2025-09-26
Generated
2026-05-07
AI Q&A
2025-09-24
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
siderolabs omni 0.3.13
siderolabs omni 0.48.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-863 The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability involves Omni Wireguard SideroLink prior to version 0.48.0, where the WireGuard interface on Omni does not validate the destination address of incoming packets. While it ensures the source IP matches the Talos peer's IPv6 address, it allows workloads running on Kubernetes, especially those with host networking, to potentially send arbitrary packets over the SideroLink interface. This could allow a malicious workload to escape restrictions and misuse the connection.


How can this vulnerability impact me? :

The vulnerability could allow malicious workloads running on Kubernetes to send arbitrary packets over the SideroLink interface, potentially escaping normal restrictions and gaining unauthorized access or control over the peer-to-peer connection between Omni and Talos machines. This could lead to unauthorized network access or compromise of the environment.


What immediate steps should I take to mitigate this vulnerability?

Upgrade Omni Wireguard SideroLink to version 0.48.0 or later, as this version contains the patch that fixes the vulnerability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart