Tried to quickly reproduce this on a test cluster but couldn't confirm
the behavior. Could you send me the full output of the following
commands (you can mail me the information directly) when the firewal is
*not* working. Note that some of the commands have placeholders (NODE
being the node where the issue occurs, VMID being the VM where the issue
occurs).


Firewall config :

$ cat /etc/pve/firewall/cluster.fw
$ cat /etc/pve/nodes/<NODE>/cluster.fw
$ cat /etc/pve/firewall/<VMID>.fw

VM configuration:

$ qm config <VMID> --current

Current status of network config:

$ ip a

$ cat /etc/network/interfaces
$ cat /etc/network/interfaces.d/sdn

compiled firewall output:

$ iptables-save -c
$ nft list ruleset

syslogs:

$ journalctl --since '2026-02-01' -u pve-firewall
$ journalctl --since '2026-02-01' -u proxmox-firewall



We have a specific channel dedicated for reporting security issues [1],
so for any future security reports please utilize this one instead of
the pve-user mailing list!

[1] https://pve.proxmox.com/wiki/Security_Reporting


On 2/2/26 6:32 PM, W3Net Admin wrote:
> Hello,
> 
> I have Identified a security bug at the DC firewall level where firewall 
> rules are bypassed. I am concerned that this could be a zero day 
> vulnerability.  Based on the conditions below, any security group, in this 
> case sg_pbs_stor_pbs is an empty group with NO rules, will hijack the traffic 
> flow and stop FW filtering. If the drop rule was placed above security groups 
> then it worked as expected. My test was pinging my host from a VM, the drop 
> rule should have stopped the ping but if the vm was on the same host, the 
> ping was acknowledged
> 
> 
> This happens in a very specific scenario, the conditions to recreate are:
> 
>   1.  VM Must be running on its Host, this does not affect VM running on a 
> different host.
>   2.  A vlan based vnet is created and tagged
>   3.  The host gets a static IP on the vnet
>   4.  Default Input Policy: Drop
> 
> nano /etc/pve/firewall/cluster.fw
> [group sg_pbs_stor_pbs] # PBS Rules  #<-Empty Group, no rules
> 
> [RULES]
> 
> GROUP sg_pbs_stor_pbs -i vmbr1.2 #<-This will steal the traffic flow and 
> processing will stop
> IN DROP -i inf0nas -log nolog #<- it never makes it here
> 
> /etc/network/interfaces.d/sdn
> auto inf0nas
> iface inf0nas
>         bridge_ports vmbr1.14
>         bridge_stp off
>         bridge_fd 0
>         mtu 9000
>         alias NAS
> 
> /etc/network/interfaces
> auto vmbr1
> iface vmbr1 inet manual
>     bridge-ports enp12s0f0np0
>     bridge-stp off
>     bridge-fd 0
>     bridge-vlan-aware yes
>     bridge-vids 1-100
>     mtu 9000
> 
> auto inf0nas   #<- notice the use of a vnet
> iface inf0nas inet static
>     address 10.32.14.111/24
>     mtu 9000
> 
> 
> Thanks,
> W3Net Admin
> 
> 
> 




Reply via email to