all lists on lists.proxmox.com
 help / color / mirror / Atom feed
* Security Bug Identified - Firewall rules bypassed
@ 2026-02-02 17:17 W3Net Admin
  2026-02-02 18:07 ` Stefan Hanreich
  0 siblings, 1 reply; 3+ messages in thread
From: W3Net Admin @ 2026-02-02 17:17 UTC (permalink / raw)
  To: pve-user

Hello,

I have Identified a security bug at the DC firewall level where firewall rules are bypassed. I am concerned that this could be a zero day vulnerability.  Based on the conditions below, any security group, in this case sg_pbs_stor_pbs is an empty group with NO rules, will hijack the traffic flow and stop FW filtering. If the drop rule was placed above security groups then it worked as expected. My test was pinging my host from a VM, the drop rule should have stopped the ping but if the vm was on the same host, the ping was acknowledged


This happens in a very specific scenario, the conditions to recreate are:

  1.  VM Must be running on its Host, this does not affect VM running on a different host.
  2.  A vlan based vnet is created and tagged
  3.  The host gets a static IP on the vnet
  4.  Default Input Policy: Drop

nano /etc/pve/firewall/cluster.fw
[group sg_pbs_stor_pbs] # PBS Rules  #<-Empty Group, no rules

[RULES]

GROUP sg_pbs_stor_pbs -i vmbr1.2 #<-This will steal the traffic flow and processing will stop
IN DROP -i inf0nas -log nolog #<- it never makes it here

/etc/network/interfaces.d/sdn
auto inf0nas
iface inf0nas
        bridge_ports vmbr1.14
        bridge_stp off
        bridge_fd 0
        mtu 9000
        alias NAS

/etc/network/interfaces
auto vmbr1
iface vmbr1 inet manual
    bridge-ports enp12s0f0np0
    bridge-stp off
    bridge-fd 0
    bridge-vlan-aware yes
    bridge-vids 1-100
    mtu 9000

auto inf0nas   #<- notice the use of a vnet
iface inf0nas inet static
    address 10.32.14.111/24
    mtu 9000


Thanks,
W3Net Admin



^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: Security Bug Identified - Firewall rules bypassed
  2026-02-02 17:17 Security Bug Identified - Firewall rules bypassed W3Net Admin
@ 2026-02-02 18:07 ` Stefan Hanreich
  2026-02-02 18:09   ` Stefan Hanreich
  0 siblings, 1 reply; 3+ messages in thread
From: Stefan Hanreich @ 2026-02-02 18:07 UTC (permalink / raw)
  To: W3Net Admin, pve-user

Tried to quickly reproduce this on a test cluster but couldn't confirm
the behavior. Could you send me the full output of the following
commands (you can mail me the information directly) when the firewal is
*not* working. Note that some of the commands have placeholders (NODE
being the node where the issue occurs, VMID being the VM where the issue
occurs).


Firewall config :

$ cat /etc/pve/firewall/cluster.fw
$ cat /etc/pve/nodes/<NODE>/cluster.fw
$ cat /etc/pve/firewall/<VMID>.fw

VM configuration:

$ qm config <VMID> --current

Current status of network config:

$ ip a

$ cat /etc/network/interfaces
$ cat /etc/network/interfaces.d/sdn

compiled firewall output:

$ iptables-save -c
$ nft list ruleset

syslogs:

$ journalctl --since '2026-02-01' -u pve-firewall
$ journalctl --since '2026-02-01' -u proxmox-firewall



We have a specific channel dedicated for reporting security issues [1],
so for any future security reports please utilize this one instead of
the pve-user mailing list!

[1] https://pve.proxmox.com/wiki/Security_Reporting


On 2/2/26 6:32 PM, W3Net Admin wrote:
> Hello,
> 
> I have Identified a security bug at the DC firewall level where firewall rules are bypassed. I am concerned that this could be a zero day vulnerability.  Based on the conditions below, any security group, in this case sg_pbs_stor_pbs is an empty group with NO rules, will hijack the traffic flow and stop FW filtering. If the drop rule was placed above security groups then it worked as expected. My test was pinging my host from a VM, the drop rule should have stopped the ping but if the vm was on the same host, the ping was acknowledged
> 
> 
> This happens in a very specific scenario, the conditions to recreate are:
> 
>   1.  VM Must be running on its Host, this does not affect VM running on a different host.
>   2.  A vlan based vnet is created and tagged
>   3.  The host gets a static IP on the vnet
>   4.  Default Input Policy: Drop
> 
> nano /etc/pve/firewall/cluster.fw
> [group sg_pbs_stor_pbs] # PBS Rules  #<-Empty Group, no rules
> 
> [RULES]
> 
> GROUP sg_pbs_stor_pbs -i vmbr1.2 #<-This will steal the traffic flow and processing will stop
> IN DROP -i inf0nas -log nolog #<- it never makes it here
> 
> /etc/network/interfaces.d/sdn
> auto inf0nas
> iface inf0nas
>         bridge_ports vmbr1.14
>         bridge_stp off
>         bridge_fd 0
>         mtu 9000
>         alias NAS
> 
> /etc/network/interfaces
> auto vmbr1
> iface vmbr1 inet manual
>     bridge-ports enp12s0f0np0
>     bridge-stp off
>     bridge-fd 0
>     bridge-vlan-aware yes
>     bridge-vids 1-100
>     mtu 9000
> 
> auto inf0nas   #<- notice the use of a vnet
> iface inf0nas inet static
>     address 10.32.14.111/24
>     mtu 9000
> 
> 
> Thanks,
> W3Net Admin
> 
> 
> 





^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: Security Bug Identified - Firewall rules bypassed
  2026-02-02 18:07 ` Stefan Hanreich
@ 2026-02-02 18:09   ` Stefan Hanreich
  0 siblings, 0 replies; 3+ messages in thread
From: Stefan Hanreich @ 2026-02-02 18:09 UTC (permalink / raw)
  To: W3Net Admin, pve-user

I forgot to add this in my previous mail, please also include the
current versions you are running:

$ pveversion -v


On 2/2/26 7:06 PM, Stefan Hanreich wrote:
> Tried to quickly reproduce this on a test cluster but couldn't confirm
> the behavior. Could you send me the full output of the following
> commands (you can mail me the information directly) when the firewal is
> *not* working. Note that some of the commands have placeholders (NODE
> being the node where the issue occurs, VMID being the VM where the issue
> occurs).
> 
> 
> Firewall config :
> 
> $ cat /etc/pve/firewall/cluster.fw
> $ cat /etc/pve/nodes/<NODE>/cluster.fw
> $ cat /etc/pve/firewall/<VMID>.fw
> 
> VM configuration:
> 
> $ qm config <VMID> --current
> 
> Current status of network config:
> 
> $ ip a
> 
> $ cat /etc/network/interfaces
> $ cat /etc/network/interfaces.d/sdn
> 
> compiled firewall output:
> 
> $ iptables-save -c
> $ nft list ruleset
> 
> syslogs:
> 
> $ journalctl --since '2026-02-01' -u pve-firewall
> $ journalctl --since '2026-02-01' -u proxmox-firewall
> 
> 
> 
> We have a specific channel dedicated for reporting security issues [1],
> so for any future security reports please utilize this one instead of
> the pve-user mailing list!
> 
> [1] https://pve.proxmox.com/wiki/Security_Reporting
> 
> 
> On 2/2/26 6:32 PM, W3Net Admin wrote:
>> Hello,
>>
>> I have Identified a security bug at the DC firewall level where firewall rules are bypassed. I am concerned that this could be a zero day vulnerability.  Based on the conditions below, any security group, in this case sg_pbs_stor_pbs is an empty group with NO rules, will hijack the traffic flow and stop FW filtering. If the drop rule was placed above security groups then it worked as expected. My test was pinging my host from a VM, the drop rule should have stopped the ping but if the vm was on the same host, the ping was acknowledged
>>
>>
>> This happens in a very specific scenario, the conditions to recreate are:
>>
>>   1.  VM Must be running on its Host, this does not affect VM running on a different host.
>>   2.  A vlan based vnet is created and tagged
>>   3.  The host gets a static IP on the vnet
>>   4.  Default Input Policy: Drop
>>
>> nano /etc/pve/firewall/cluster.fw
>> [group sg_pbs_stor_pbs] # PBS Rules  #<-Empty Group, no rules
>>
>> [RULES]
>>
>> GROUP sg_pbs_stor_pbs -i vmbr1.2 #<-This will steal the traffic flow and processing will stop
>> IN DROP -i inf0nas -log nolog #<- it never makes it here
>>
>> /etc/network/interfaces.d/sdn
>> auto inf0nas
>> iface inf0nas
>>         bridge_ports vmbr1.14
>>         bridge_stp off
>>         bridge_fd 0
>>         mtu 9000
>>         alias NAS
>>
>> /etc/network/interfaces
>> auto vmbr1
>> iface vmbr1 inet manual
>>     bridge-ports enp12s0f0np0
>>     bridge-stp off
>>     bridge-fd 0
>>     bridge-vlan-aware yes
>>     bridge-vids 1-100
>>     mtu 9000
>>
>> auto inf0nas   #<- notice the use of a vnet
>> iface inf0nas inet static
>>     address 10.32.14.111/24
>>     mtu 9000
>>
>>
>> Thanks,
>> W3Net Admin
>>
>>
>>
> 





^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2026-02-02 18:09 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2026-02-02 17:17 Security Bug Identified - Firewall rules bypassed W3Net Admin
2026-02-02 18:07 ` Stefan Hanreich
2026-02-02 18:09   ` Stefan Hanreich

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.
Service provided by Proxmox Server Solutions GmbH | Privacy | Legal