CNI Portmap Plugin Vulnerability

MEDIUM (6.6) Patch Available

Threat Intelligence

Medium Risk - Detectable
EPSS Score: 0.01% chance of exploitation (percentile: 1%)
🔍 Detection Tools: OSV.dev
⚔️ Exploit Availability: No public exploits found

How we test →

What is it?

The CNI portmap plugin is a component of container networking that allows containers to emulate opening a host port. This vulnerability occurs when the plugin is configured with the nftables backend and does not properly filter traffic, allowing containers to intercept all traffic destined for a specific port. This can lead to unauthorized access to sensitive data or systems.

Am I affected?

You're affected if you use CNI portmap. Affected versions: 1.8.0, 1.6.0 If you don't recognise this software, you're probably not affected.

Affected Products

Container Network Interface (CNI) project / CNI portmap plugin

How to fix

To fix this issue:
- Upgrade to CNI portmap version 1.9.0.
- Configure the plugin to use the iptables backend instead of nftables.

Immediate mitigations if upgrade isn't possible:
- Restrict network access to your container instances (firewall them from the public internet)
- Audit container networking configuration files for suspicious settings