CVE-2019-19330

moderate-risk
Published 2019-11-27

The HTTP/2 implementation in HAProxy before 2.0.10 mishandles headers, as demonstrated by carriage return (CR, ASCII 0xd), line feed (LF, ASCII 0xa), and the zero character (NUL, ASCII 0x0), aka Intermediary Encapsulation Attacks.

Do I need to act?

-
0.96% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
+
Fix available
Upgrade to: ac198b92d461515551b95daae20954b3053ce87e
9
CVSS 9.8/10 Critical
NETWORK / LOW complexity

Affected Vendors

47
/ 100
moderate-risk
Severity 32/34 · Critical
Exploitability 3/34 · Minimal
Exposure 12/34 · Low