Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. antrea.io/antrea
  4. ›
  5. CVE-2026-25804

CVE-2026-25804: Antrea has invalid enforcement order for network policy rules caused by integer overflow

February 6, 2026 (updated February 7, 2026)

Antrea’s network policy priority assignment system has a uint16 arithmetic overflow bug that causes incorrect OpenFlow priority calculations when handling a large numbers of policies with various priority values. This results in potentially incorrect traffic enforcement.

If a user creates a large number of Antrea NetworkPolicies (ANP or ACNP) with varying priorities, some rules with lower logical priorities (higher numerical priority values) may take precedence over rules with higher logical priorities (lower numerical priority values). Traffic that should be denied by the configured Antrea NetworkPolicies may end up being allowed, potentially letting an attacker access a sensitive service. Traffic that should be allowed by the configured Antrea NetworkPolicies may end up being denied, breaking applications and potentially opening the door for denial-of-service attacks.

The Antrea NetworkPolicy system comes with support for priority Tiers. Rules defined within a Tier cannot take precedence over rules defined in higher priority Tiers. Some users / roles may only be authorized to define within specific Tiers. This security vulnerability enables such users to intentionally “escape” their Tier and override rules in higher priority Tiers.

Antrea deployments that only use upstream Kubernetes NetworkPolicies - and do not use Antrea NetworkPolicies - are not affected.

References

  • gist.github.com/antoninbas/c429cc3e5bb8479ba7ff38fd6fde59d9
  • github.com/advisories/GHSA-86x4-wp9f-wrr9
  • github.com/antrea-io/antrea
  • github.com/antrea-io/antrea/blob/main/docs/antrea-network-policy.md
  • github.com/antrea-io/antrea/commit/86c4b6010f3be536866f339b632621c23d7186fa
  • github.com/antrea-io/antrea/pull/7496
  • github.com/antrea-io/antrea/security/advisories/GHSA-86x4-wp9f-wrr9
  • nvd.nist.gov/vuln/detail/CVE-2026-25804

Code Behaviors & Features

Detect and mitigate CVE-2026-25804 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.3.2, all versions starting from 2.4.0 before 2.4.3

Fixed versions

  • 2.3.2
  • 2.4.3

Solution

Upgrade to versions 2.3.2, 2.4.3 or above.

Impact 9.4 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L

Learn more about CVSS

Weakness

  • CWE-287: Improper Authentication
  • CWE-770: Allocation of Resources Without Limits or Throttling

Source file

go/antrea.io/antrea/CVE-2026-25804.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 07 Feb 2026 12:17:17 +0000.