PT-2025-44025 · Unknown · Constellation+2
Published
2025-10-27
·
Updated
2025-11-28
·
CVE-2025-58356
CVSS v4.0
8.3
High
| AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X |
Name of the Vulnerable Software and Affected Versions
Constellation versions prior to 2.24.0
Description
Constellation is a Confidential Kubernetes platform that utilizes LUKS2-encrypted volumes for persistent storage. When opening an encrypted storage device, the system employs the
crypt activate by passhrase function from the libcryptsetup library. A weakness exists in handling null keyslot algorithms within cryptsetup versions prior to 2.8.1, potentially allowing a volume to appear encrypted when it is not. Specifically, cryptsetup versions before 2.8.1 do not signal an error when encountering LUKS2 disks employing the cipher null-ecb algorithm in the keyslot encryption field. A malicious host could provide a crafted LUKS2 volume to a confidential computing guest, leading to secret data being written with a volume key known to the attacker, or pre-loaded data compromising guest execution. The LUKS2 volume metadata lacks authentication, enabling an attacker to create a volume that opens without error, records writes in plaintext (or with an attacker-known key), and contains arbitrary data. This issue arises because the keyslot encryption algorithm can be set to crypto null-ecb, bypassing the need for enclave-held secret data during decryption.Recommendations
Upgrade to Constellation version 2.24.0 or later.
Exploit
Fix
Improper Verification of Cryptographic Signature
Files Accessible to External Parties
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Constellation
Cryptsetup
Libcryptsetup