QUIC in HAProxy 3.1.x before 3.1-dev7, 3.0.x before 3.0.5, and 2.9.x before 2.9.11 allows opening a 0-RTT session with a spoofed IP address. This can bypass the IP allow/block list functionality.
History

Tue, 29 Oct 2024 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-290

Tue, 15 Oct 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 15 Oct 2024 01:30:00 +0000

Type Values Removed Values Added
Title haproxy: Spoofed IP Bypass in HAProxy QUIC Listener 0-RTT Sessions
Weaknesses CWE-940
References
Metrics threat_severity

None

threat_severity

Moderate


Mon, 14 Oct 2024 03:45:00 +0000

Type Values Removed Values Added
Description QUIC in HAProxy 3.1.x before 3.1-dev7, 3.0.x before 3.0.5, and 2.9.x before 2.9.11 allows opening a 0-RTT session with a spoofed IP address. This can bypass the IP allow/block list functionality.
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AC:L/AV:N/A:N/C:N/I:L/PR:N/S:U/UI:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2024-10-14T00:00:00

Updated: 2024-10-29T15:16:03.727Z

Reserved: 2024-10-14T00:00:00

Link: CVE-2024-49214

cve-icon Vulnrichment

Updated: 2024-10-15T15:56:06.767Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-10-14T04:15:05.853

Modified: 2024-10-29T16:35:14.877

Link: CVE-2024-49214

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-10-14T00:00:00Z

Links: CVE-2024-49214 - Bugzilla