First published: Mon Oct 14 2024(Updated: )
QUIC in HAProxy 3.1.x before 3.1-dev7, 3.0.x before 3.0.5, and 2.9.x before 2.9.11 allows opening a 0-RTT session with a spoofed IP address. This can bypass the IP allow/block list functionality.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
HAProxy | <3.1-dev7 | |
HAProxy | <3.0.5 | |
HAProxy | <2.9.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-49214 is considered a significant vulnerability due to its potential to bypass IP allow/block list functionalities.
To fix CVE-2024-49214, upgrade HAProxy to version 3.1-dev7 or later, 3.0.5 or later, or 2.9.11 or later.
CVE-2024-49214 affects HAProxy versions prior to 3.1-dev7, 3.0.5, and 2.9.11.
CVE-2024-49214 allows an attacker to open a 0-RTT session with a spoofed IP address.
Yes, CVE-2024-49214 can significantly impact network security by allowing unauthorized access to services that rely on IP filtering.