Linux Distros Unpatched Vulnerability : CVE-2025-30162

medium Nessus Plugin ID 261588

Synopsis

The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.

Description

The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.

- Cilium is a networking, observability, and security solution with an eBPF-based dataplane. For Cilium users who use Gateway API for Ingress for some services and use LB-IPAM or BGP for LB Service implementation and use network policies to block egress traffic from workloads in a namespace to workloads in other namespaces, egress traffic from workloads covered by such network policies to LoadBalancers configured by `Gateway` resources will incorrectly be allowed. LoadBalancer resources not deployed via a Gateway API configuration are not affected by this issue. This issue affects: Cilium v1.15 between v1.15.0 and v1.15.14 inclusive, v1.16 between v1.16.0 and v1.16.7 inclusive, and v1.17 between v1.17.0 and v1.17.1 inclusive. This issue is fixed in Cilium v1.15.15, v1.16.8, and v1.17.2. A Clusterwide Cilium Network Policy can be used to work around this issue for users who are unable to upgrade. (CVE-2025-30162)

Note that Nessus relies on the presence of the package as reported by the vendor.

Solution

There is no known solution at this time.

See Also

https://access.redhat.com/security/cve/cve-2025-30162

Plugin Details

Severity: Medium

ID: 261588

File Name: unpatched_CVE_2025_30162.nasl

Version: 1.2

Type: local

Agent: unix

Family: Misc.

Published: 9/6/2025

Updated: 9/10/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.2

CVSS v2

Risk Factor: Medium

Base Score: 6.4

Temporal Score: 4.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

CVSS Score Source: CVE-2025-30162

CVSS v3

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.8

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:centos:centos:podman-gvproxy, p-cpe:/a:redhat:enterprise_linux:podman-docker, p-cpe:/a:redhat:enterprise_linux:buildah, p-cpe:/a:redhat:enterprise_linux:podman-catatonit, p-cpe:/a:redhat:enterprise_linux:delve, cpe:/o:centos:centos:8, p-cpe:/a:redhat:enterprise_linux:buildah-tests, p-cpe:/a:redhat:enterprise_linux:podman, p-cpe:/a:centos:centos:podman-tests, p-cpe:/a:redhat:enterprise_linux:podman-remote, p-cpe:/a:centos:centos:podman-remote, p-cpe:/a:centos:centos:runc, p-cpe:/a:centos:centos:podman, cpe:/o:redhat:enterprise_linux:10, cpe:/o:redhat:enterprise_linux:8, p-cpe:/a:centos:centos:podman-docker, p-cpe:/a:redhat:enterprise_linux:podman-manpages, cpe:/o:redhat:enterprise_linux:9, p-cpe:/a:centos:centos:podman-catatonit, p-cpe:/a:redhat:enterprise_linux:runc, p-cpe:/a:centos:centos:buildah, p-cpe:/a:centos:centos:podman-manpages, p-cpe:/a:centos:centos:podman-plugins, p-cpe:/a:centos:centos:buildah-tests, p-cpe:/a:centos:centos:delve, p-cpe:/a:redhat:enterprise_linux:podman-gvproxy, p-cpe:/a:redhat:enterprise_linux:podman-plugins, p-cpe:/a:redhat:enterprise_linux:podman-tests

Required KB Items: Host/local_checks_enabled, Host/cpu, global_settings/vendor_unpatched, Host/OS/identifier

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 3/24/2025

Reference Information

CVE: CVE-2025-30162