Description
Squid is a caching proxy for the Web. Prior to version 7.5, due to improper input validation, Squid is vulnerable to out of bounds read when handling ICP traffic. This problem allows a remote attacker to receive small amounts of memory potentially containing sensitive information when responding with errors to invalid ICP requests. This attack is limited to Squid deployments that explicitly enable ICP support (i.e. configure non-zero `icp_port`). This problem cannot be mitigated by denying ICP queries using `icp_access` rules. Version 7.5 contains a patch.
Published: 2026-03-26
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Information Disclosure
Action: Apply Patch
AI Analysis

Impact

Squid, the web caching proxy, contains an out‑of‑bounds read in its ICP message handling. When a client sends a malformed ICP request, Squid copies a small amount of memory into an error response before it has validated the input. The copied data may include confidential information, such as credentials or configuration snippets. The flaw is a classic buffer over‑read (CWE‑125) caused by improper input validation (CWE‑1289).

Affected Systems

The issue affects Squid implementations that enable ICP support – that is, when the configuration parameter `icp_port` is set to a non‑zero value. All Squid releases prior to version 7.5 are vulnerable, including the widely deployed 7.0, 7.2 and early 7.4 series. Systems that have disabled ICP or left the default port unchanged are not impacted.

Risk and Exploitability

The CVSS score of 6.9 indicates a moderate severity. EPSS scoring shows an exploitation likelihood of less than 1 %, and the vulnerability is not listed in the CISA KEV catalog. Exploitation can be carried out from any remote host that can reach the ICP port, by sending specially crafted requests that trigger the out‑of‑bounds read. The result is information disclosure; there is no evidence of code execution or other escalation. The recommended mitigation is to upgrade to Squid 7.5 or later, or to disable ICP if it is not required.

Generated by OpenCVE AI on March 31, 2026 at 05:46 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Squid to version 7.5 or newer which contains the patch for the ICP over‑read bug.

Generated by OpenCVE AI on March 31, 2026 at 05:46 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Ubuntu USN Ubuntu USN USN-8157-1 Squid vulnerabilities
History

Tue, 31 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}


Thu, 26 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

threat_severity

Moderate


Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Squid-cache
Squid-cache squid
Vendors & Products Squid-cache
Squid-cache squid

Thu, 26 Mar 2026 01:30:00 +0000

Type Values Removed Values Added
References

Thu, 26 Mar 2026 01:00:00 +0000

Type Values Removed Values Added
Description Squid is a caching proxy for the Web. Prior to version 7.5, due to improper input validation, Squid is vulnerable to out of bounds read when handling ICP traffic. This problem allows a remote attacker to receive small amounts of memory potentially containing sensitive information when responding with errors to invalid ICP requests. This attack is limited to Squid deployments that explicitly enable ICP support (i.e. configure non-zero `icp_port`). This problem cannot be mitigated by denying ICP queries using `icp_access` rules. Version 7.5 contains a patch.
Title Squid has issues in ICP message handling
Weaknesses CWE-125
CWE-1289
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:L/SI:N/SA:N'}


Subscriptions

Squid-cache Squid
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-26T14:19:39.660Z

Reserved: 2026-03-20T16:59:08.891Z

Link: CVE-2026-33515

cve-icon Vulnrichment

Updated: 2026-03-26T00:24:56.505Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-26T01:16:27.690

Modified: 2026-03-31T01:22:04.203

Link: CVE-2026-33515

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-03-26T00:13:51Z

Links: CVE-2026-33515 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T20:09:12Z

Weaknesses