QUIC in HAProxy 3.1.x before 3.1-dev7, 3.0.x before 3.0.5, and 2.9.x before 2.9.11 allows opening a 0-RTT session with a spoofed IP address. This can bypass the IP allow/block list functionality.
Metrics
Affected Vendors & Products
References
History
Tue, 29 Oct 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-290 |
Tue, 15 Oct 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 15 Oct 2024 01:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | haproxy: Spoofed IP Bypass in HAProxy QUIC Listener 0-RTT Sessions | |
Weaknesses | CWE-940 | |
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Mon, 14 Oct 2024 03:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | QUIC in HAProxy 3.1.x before 3.1-dev7, 3.0.x before 3.0.5, and 2.9.x before 2.9.11 allows opening a 0-RTT session with a spoofed IP address. This can bypass the IP allow/block list functionality. | |
References |
|
|
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-10-14T00:00:00
Updated: 2024-10-29T15:16:03.727Z
Reserved: 2024-10-14T00:00:00
Link: CVE-2024-49214
Vulnrichment
Updated: 2024-10-15T15:56:06.767Z
NVD
Status : Awaiting Analysis
Published: 2024-10-14T04:15:05.853
Modified: 2024-10-29T16:35:14.877
Link: CVE-2024-49214
Redhat