<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Isovalent — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/isovalent/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 26 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/isovalent/feed.xml" rel="self" type="application/rss+xml"/><item><title>Cilium `cilium-bugtool` WireGuard Private Key Exposure</title><link>https://feed.craftedsignal.io/briefs/2026-04-cilium-wg-key-disclosure/</link><pubDate>Sun, 26 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-cilium-wg-key-disclosure/</guid><description>The `cilium-bugtool` debugging tool in Cilium exposes WireGuard private keys, potentially allowing unauthorized access to encrypted node-to-node communication in affected versions.</description><content:encoded><![CDATA[<p>A vulnerability exists in the <code>cilium-bugtool</code> utility within Cilium, an open-source networking and security platform for cloud-native environments. When used with WireGuard Transparent Encryption enabled, the tool can inadvertently include the WireGuard private key (<code>cilium_wg0.key</code>) in its output. This affects Cilium versions v1.19 between v1.19.0 and v1.19.2, v1.18 between v1.18.0 and v1.18.8, and all versions prior to v1.17.15. The exposure occurs because the tool, used for debugging and generating system dumps, collects sensitive configuration files. The vulnerability was reported and addressed by the Cilium community, with patches released in versions v1.19.3, v1.18.9, and v1.17.15. Failure to patch could lead to unauthorized decryption of network traffic.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains access to a system running a vulnerable Cilium version with WireGuard enabled, or obtains a <code>cilium-bugtool</code> archive.</li>
<li>The <code>cilium-bugtool</code> or <code>cilium sysdump</code> command is executed, either manually by a user or an automated process (initiated by the attacker if they have access).</li>
<li>The tool collects various debugging information, including the <code>cilium_wg0.key</code> file containing the WireGuard private key.</li>
<li>The resulting archive is stored locally, potentially accessible to the attacker.</li>
<li>Attacker exfiltrates the <code>cilium-bugtool</code> archive containing the WireGuard private key.</li>
<li>The attacker uses the extracted private key to decrypt WireGuard-encrypted traffic between Cilium nodes.</li>
<li>The attacker monitors and intercepts sensitive network communications.</li>
<li>Attacker pivots within the cluster using the decrypted traffic to discover additional services or escalate privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to decrypt network traffic between Cilium nodes that are using WireGuard encryption. This could lead to the exposure of sensitive data, such as credentials, API keys, or proprietary information. The number of affected deployments is currently unknown, but any Cilium environment using WireGuard encryption and running a vulnerable version is at risk. The impact is significant because it compromises the confidentiality of network communications, potentially enabling further attacks and data breaches.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Cilium to versions v1.19.3, v1.18.9, or v1.17.15 or later to remediate CVE-2026-41520.</li>
<li>Rotate WireGuard keys on affected nodes if <code>cilium-bugtool</code> archives have been shared externally, as suggested in the advisory. Delete the <code>cilium_wg0.key</code> file and restart the Cilium agent.</li>
<li>Implement strict access control policies to limit who can execute <code>cilium-bugtool</code> or <code>cilium sysdump</code> commands, preventing unauthorized key disclosure.</li>
<li>Monitor for unusual execution of <code>cilium-bugtool</code> or <code>cilium sysdump</code> using process monitoring tools. Deploy a Sigma rule that detects unexpected execution paths.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cilium</category><category>wireguard</category><category>key-disclosure</category><category>credential-access</category></item></channel></rss>