CVE-2025-67499

6.6 MEDIUM

📋 TL;DR

The CNI portmap plugin versions 1.6.0-1.8.0 with nftables backend incorrectly forward all traffic on a host port to containers requesting HostPort forwarding, ignoring destination IP. This allows containers to intercept traffic intended for other containers or the node itself. Only systems using the portmap plugin with explicit nftables backend configuration are affected.

💻 Affected Systems

Products:
  • containernetworking/plugins portmap plugin
Versions: 1.6.0 through 1.8.0
Operating Systems: Linux
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when portmap plugin is explicitly configured with nftables backend. Default iptables backend is not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious container intercepts all traffic on critical ports (e.g., SSH, API endpoints), enabling data theft, man-in-the-middle attacks, or service disruption across the node.

🟠

Likely Case

Container unintentionally receives traffic meant for other containers, causing service failures or exposing sensitive data to unauthorized containers.

🟢

If Mitigated

With proper network segmentation and container isolation, impact is limited to traffic within the affected node's network segment.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires ability to deploy containers with HostPort forwarding on vulnerable nodes. No authentication bypass needed beyond container deployment permissions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.9.0

Vendor Advisory: https://github.com/containernetworking/plugins/security/advisories/GHSA-jv3w-x3r3-g6rm

Restart Required: Yes

Instructions:

1. Update CNI plugins to version 1.9.0 or later. 2. Restart all containers using portmap plugin. 3. Verify nftables rules are correctly filtering by destination IP.

🔧 Temporary Workarounds

Switch to iptables backend

linux

Configure portmap plugin to use iptables backend instead of nftables backend

Edit CNI configuration to set "backend": "iptables" in portmap plugin config

🧯 If You Can't Patch

  • Isolate affected nodes from sensitive network segments
  • Implement network policies to restrict container-to-container communication

🔍 How to Verify

Check if Vulnerable:

Check CNI plugin version and portmap configuration: 1. Verify CNI plugin version is 1.6.0-1.8.0. 2. Check if portmap plugin config has "backend": "nftables".

Check Version:

cni-plugin --version | grep portmap

Verify Fix Applied:

1. Confirm CNI plugin version is 1.9.0+. 2. Verify nftables rules include destination IP filtering for portmap rules. 3. Test that containers only receive traffic destined for their specific IP.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected traffic patterns in container network logs
  • Portmap plugin error logs indicating misconfigured rules

Network Indicators:

  • Traffic on host ports being received by multiple containers
  • Unexpected network flows between containers sharing host ports

SIEM Query:

source="kubelet" AND "portmap" AND ("nftables" OR "misconfigured")

🔗 References

📤 Share & Export