CVE-2024-39321
moderate-risk
Published 2024-07-05
Traefik is an HTTP reverse proxy and load balancer. Versions prior to 2.11.6, 3.0.4, and 3.1.0-rc3 have a vulnerability that allows bypassing IP allow-lists via HTTP/3 early data requests in QUIC 0-RTT handshakes sent with spoofed IP addresses. Versions 2.11.6, 3.0.4, and 3.1.0-rc3 contain a patch for this issue. No known workarounds are available.
Do I need to act?
-
0.18% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Vendors
References (8)
Release Notes
https://github.com/traefik/traefik/releases/tag/v2.11.6
Release Notes
https://github.com/traefik/traefik/releases/tag/v3.0.4
Release Notes
https://github.com/traefik/traefik/releases/tag/v2.11.6
Release Notes
https://github.com/traefik/traefik/releases/tag/v3.0.4
37
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
1/34 · Minimal
Exposure
10/34 · Low