GHSA-86X4-WP9F-WRR9

Vulnerability from github – Published: 2026-02-06 22:36 – Updated: 2026-02-07 00:33
VLAI?
Summary
Antrea has invalid enforcement order for network policy rules caused by integer overflow
Details

Impact

Antrea's network policy priority assignment system has a uint16 arithmetic overflow bug that causes incorrect OpenFlow priority calculations when handling a large numbers of policies with various priority values. This results in potentially incorrect traffic enforcement.

If a user creates a large number of Antrea NetworkPolicies (ANP or ACNP) with varying priorities, some rules with lower logical priorities (higher numerical priority values) may take precedence over rules with higher logical priorities (lower numerical priority values). Traffic that should be denied by the configured Antrea NetworkPolicies may end up being allowed, potentially letting an attacker access a sensitive service. Traffic that should be allowed by the configured Antrea NetworkPolicies may end up being denied, breaking applications and potentially opening the door for denial-of-service attacks.

The Antrea NetworkPolicy system comes with support for priority Tiers. Rules defined within a Tier cannot take precedence over rules defined in higher priority Tiers. Some users / roles may only be authorized to define within specific Tiers. This security vulnerability enables such users to intentionally "escape" their Tier and override rules in higher priority Tiers.

Antrea deployments that only use upstream Kubernetes NetworkPolicies - and do not use Antrea NetworkPolicies - are not affected.

Patches

https://github.com/antrea-io/antrea/pull/7496 Antrea v2.5.0 Antrea v2.4.3 Antrea v2.3.2

Workarounds

Antrea deployments that only use upstream Kubernetes NetworkPolicies - and do not use Antrea NetworkPolicies - are not affected.

For users leveraging Antrea NetworkPolicies, there is no way to fix or remediate the vulnerability without upgrading.

Resources

https://gist.github.com/antoninbas/c429cc3e5bb8479ba7ff38fd6fde59d9 https://github.com/antrea-io/antrea/pull/7496 https://github.com/antrea-io/antrea/blob/main/docs/antrea-network-policy.md

Show details on source website

{
  "affected": [
    {
      "package": {
        "ecosystem": "Go",
        "name": "antrea.io/antrea"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "2.3.2"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "Go",
        "name": "antrea.io/antrea"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "2.4.0"
            },
            {
              "fixed": "2.4.3"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "aliases": [
    "CVE-2026-25804"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-287",
      "CWE-770"
    ],
    "github_reviewed": true,
    "github_reviewed_at": "2026-02-06T22:36:29Z",
    "nvd_published_at": "2026-02-06T23:15:55Z",
    "severity": "HIGH"
  },
  "details": "### Impact\n\nAntrea\u0027s network policy priority assignment system has a uint16 arithmetic overflow bug that causes incorrect OpenFlow priority calculations when handling a large numbers of policies with various priority values. This results in potentially incorrect traffic enforcement.\n\nIf a user creates a large number of Antrea NetworkPolicies (ANP or ACNP) with varying priorities, some rules with lower logical priorities (higher numerical priority values) may take precedence over rules with higher logical priorities (lower numerical priority values). Traffic that should be denied by the configured Antrea NetworkPolicies may end up being allowed, potentially letting an attacker access a sensitive service. Traffic that should be allowed by the configured Antrea NetworkPolicies may end up being denied, breaking applications and potentially opening the door for denial-of-service attacks.\n\nThe Antrea NetworkPolicy system comes with support for priority Tiers. Rules defined within a Tier cannot take precedence over rules defined in higher priority Tiers. Some users / roles may only be authorized to define within specific Tiers. This security vulnerability enables such users to intentionally \"escape\" their Tier and override rules in higher priority Tiers.\n\nAntrea deployments that *only* use upstream Kubernetes NetworkPolicies - and do not use Antrea NetworkPolicies - are not affected.\n\n### Patches\nhttps://github.com/antrea-io/antrea/pull/7496\nAntrea v2.5.0\nAntrea v2.4.3\nAntrea v2.3.2\n\n### Workarounds\n\nAntrea deployments that *only* use upstream Kubernetes NetworkPolicies - and do not use Antrea NetworkPolicies - are not affected.\n\nFor users leveraging Antrea NetworkPolicies, there is no way to fix or remediate the vulnerability without upgrading.\n\n### Resources\n\nhttps://gist.github.com/antoninbas/c429cc3e5bb8479ba7ff38fd6fde59d9\nhttps://github.com/antrea-io/antrea/pull/7496\nhttps://github.com/antrea-io/antrea/blob/main/docs/antrea-network-policy.md",
  "id": "GHSA-86x4-wp9f-wrr9",
  "modified": "2026-02-07T00:33:42Z",
  "published": "2026-02-06T22:36:29Z",
  "references": [
    {
      "type": "WEB",
      "url": "https://github.com/antrea-io/antrea/security/advisories/GHSA-86x4-wp9f-wrr9"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25804"
    },
    {
      "type": "WEB",
      "url": "https://github.com/antrea-io/antrea/pull/7496"
    },
    {
      "type": "WEB",
      "url": "https://github.com/antrea-io/antrea/commit/86c4b6010f3be536866f339b632621c23d7186fa"
    },
    {
      "type": "WEB",
      "url": "https://gist.github.com/antoninbas/c429cc3e5bb8479ba7ff38fd6fde59d9"
    },
    {
      "type": "PACKAGE",
      "url": "https://github.com/antrea-io/antrea"
    },
    {
      "type": "WEB",
      "url": "https://github.com/antrea-io/antrea/blob/main/docs/antrea-network-policy.md"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:U",
      "type": "CVSS_V4"
    }
  ],
  "summary": "Antrea has invalid enforcement order for network policy rules caused by integer overflow"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…