Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-34992

CVE-2026-34992: Antrea Information Disclosure Vulnerability

CVE-2026-34992 is an information disclosure vulnerability in Antrea that exposes IPv6 Pod traffic in plaintext when IPsec encryption is enabled. This article covers technical details, affected versions, and mitigation.

Published: April 10, 2026

CVE-2026-34992 Overview

CVE-2026-34992 is a missing encryption vulnerability in Antrea, a Kubernetes networking solution. In Antrea clusters configured for dual-stack networking with IPsec encryption enabled (trafficEncryptionMode: ipsec), Antrea fails to apply encryption for IPv6 Pod traffic. While IPv4 traffic is correctly encrypted via ESP (Encapsulating Security Payload), traffic using IPv6 is transmitted in plaintext. This occurs because IPv6 packets are encapsulated using Geneve or VXLAN but bypass the IPsec encryption layer entirely.

Critical Impact

Inter-Node Pod traffic using IPv6 in dual-stack Kubernetes clusters with IPsec encryption enabled is transmitted unencrypted, exposing sensitive data to potential interception by adjacent network attackers.

Affected Products

  • Antrea versions prior to 2.4.5
  • Antrea versions prior to 2.5.2
  • Dual-stack Kubernetes clusters with IPsec encryption enabled

Discovery Timeline

  • 2026-04-06 - CVE CVE-2026-34992 published to NVD
  • 2026-04-07 - Last updated in NVD database

Technical Details for CVE-2026-34992

Vulnerability Analysis

This vulnerability (CWE-311: Missing Encryption of Sensitive Data) affects the traffic encryption implementation in Antrea's network overlay. The root issue lies in how Antrea handles IPsec configuration for dual-stack (IPv4/IPv6) deployments. When administrators enable IPsec encryption via the trafficEncryptionMode: ipsec configuration, Antrea correctly establishes IPsec Security Associations (SAs) and encrypts IPv4 inter-Node Pod traffic using ESP. However, the IPv6 traffic path fails to utilize these encryption mechanisms.

The adjacent network attack vector means an attacker with access to the network segment between Kubernetes nodes can passively capture unencrypted IPv6 Pod traffic. This could expose sensitive application data, credentials, API tokens, or other confidential information transmitted between Pods on different nodes.

Root Cause

The vulnerability stems from an implementation gap in Antrea's traffic encryption handling for dual-stack networking configurations. When traffic is encapsulated using Geneve or VXLAN tunnels for inter-Node communication, the IPv6 packets bypass the IPsec encryption layer that is correctly applied to IPv4 traffic. This indicates a missing or incomplete code path for applying IPsec encryption specifically to IPv6 encapsulated traffic.

Attack Vector

An attacker positioned on the adjacent network (same Layer 2 segment or with access to network infrastructure between Kubernetes nodes) can intercept IPv6 Pod traffic in plaintext. The attack requires no authentication or user interaction, making passive eavesdropping straightforward for an attacker with appropriate network positioning.

The exploitation scenario involves:

  1. Attacker gains access to the network segment between Kubernetes nodes (data center network, cloud VPC, or overlay network infrastructure)
  2. Attacker deploys packet capture tools to monitor inter-Node traffic
  3. IPv6 Pod-to-Pod communications traversing nodes are captured in plaintext
  4. Sensitive data, credentials, or application traffic is extracted from captured packets

No code example is provided as the vulnerability is a configuration and implementation gap rather than an exploitable code path. For technical details on the fix, refer to the GitHub Security Advisory GHSA-qcmw-8mm4-4p28 and related pull requests #7757 and #7759.

Detection Methods for CVE-2026-34992

Indicators of Compromise

  • Unencrypted IPv6 traffic observed between Kubernetes nodes on Geneve or VXLAN tunnel ports
  • Packet captures showing plaintext IPv6 Pod traffic while IPv4 traffic is ESP-encrypted
  • Network monitoring alerts for unencrypted traffic on expected-encrypted inter-Node communication paths

Detection Strategies

  • Deploy network traffic analysis tools to inspect inter-Node traffic and verify encryption status for both IPv4 and IPv6
  • Use tcpdump or Wireshark on node interfaces to capture tunnel traffic and verify ESP encapsulation is applied to IPv6 packets
  • Implement Kubernetes network policy auditing to detect potential data exposure from unencrypted channels
  • Monitor for anomalous traffic patterns indicating possible passive interception attempts

Monitoring Recommendations

  • Enable logging of IPsec SA establishment and verify SAs exist for both IPv4 and IPv6 traffic
  • Implement network intrusion detection systems (IDS) to alert on plaintext sensitive data traversing inter-Node links
  • Audit Antrea controller logs for any warnings related to IPsec or encryption configuration issues
  • Regularly verify traffic encryption status using the Antrea Traffic Encryption Guide

How to Mitigate CVE-2026-34992

Immediate Actions Required

  • Upgrade Antrea to version 2.4.5 or 2.5.2 immediately if running dual-stack clusters with IPsec encryption
  • Verify your cluster configuration to determine if dual-stack networking with IPsec is enabled
  • Conduct a risk assessment to identify potential data exposure during the vulnerable window
  • Review network access controls to restrict adjacent network access to authorized personnel only

Patch Information

This vulnerability is fixed in Antrea versions 2.4.5 and 2.5.2. The fix is implemented in commit 738bad662. Users should upgrade to the patched versions through their standard Kubernetes deployment processes. For upgrade guidance, refer to the GitHub Security Advisory GHSA-qcmw-8mm4-4p28.

Workarounds

  • Temporarily disable dual-stack networking and operate in single-stack IPv4 mode until upgrade is possible
  • Implement network segmentation to isolate inter-Node traffic from potential attackers
  • Deploy additional network-layer encryption such as WireGuard or a service mesh with mTLS to protect IPv6 traffic
  • Restrict physical and logical network access to infrastructure carrying inter-Node Kubernetes traffic
bash
# Verify Antrea version and encryption configuration
kubectl get pods -n kube-system -l app=antrea -o jsonpath='{.items[0].spec.containers[0].image}'
kubectl get configmap -n kube-system antrea-config -o yaml | grep trafficEncryptionMode

# Check for dual-stack configuration
kubectl get nodes -o jsonpath='{.items[*].spec.podCIDRs}'

# Upgrade Antrea to patched version (example using kubectl)
kubectl apply -f https://github.com/antrea-io/antrea/releases/download/v2.5.2/antrea.yml

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechAntrea

  • SeverityHIGH

  • CVSS Score7.1

  • EPSS Probability0.01%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-311
  • Technical References
  • GitHub Traffic Encryption Guide

  • GitHub Commit 738bad662

  • GitHub Pull Request #7757

  • GitHub Pull Request #7759

  • GitHub Security Advisory GHSA-qcmw-8mm4-4p28
  • Related CVEs
  • CVE-2026-25804: Antrea Privilege Escalation Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English