First published: Thu Mar 06 2025(Updated: )
Expected Behavior Violation vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 9.0.0 through 9.2.8, from 10.0.0 through 10.0.3. Users are recommended to upgrade to versions 9.2.9 or 10.0.4 or newer, which fixes the issue.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Traffic Server | >=9.0.0<9.2.8>=10.0.0<10.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-56202 is classified as a vulnerability affecting Apache Traffic Server versions 9.0.0 to 9.2.8 and 10.0.0 to 10.0.3.
To fix CVE-2024-56202, upgrade Apache Traffic Server to version 9.2.9 or 10.0.4 or newer.
CVE-2024-56202 affects Apache Traffic Server versions from 9.0.0 to 9.2.8 and from 10.0.0 to 10.0.3.
CVE-2024-56202 is an Expected Behavior Violation vulnerability.
All users running Apache Traffic Server versions 9.0.0 through 9.2.8 or 10.0.0 through 10.0.3 should upgrade to mitigate CVE-2024-56202.