CVE-2023-46724

SQUID-2023:4 Denial of Service in SSL Certificate validation

Description

Squid is a caching proxy for the Web. Due to an Improper Validation of Specified Index bug, Squid versions 3.3.0.1 through 5.9 and 6.0 prior to 6.4 compiled using `--with-openssl` are vulnerable to a Denial of Service attack against SSL Certificate validation. This problem allows a remote server to perform Denial of Service against Squid Proxy by initiating a TLS Handshake with a specially crafted SSL Certificate in a server certificate chain. This attack is limited to HTTPS and SSL-Bump. This bug is fixed in Squid version 6.4. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. Those who you use a prepackaged version of Squid should refer to the package vendor for availability information on updated packages.

Categories

8.6
CVSS
Severity: High
CVSS 3.1 •
EPSS 0.34%
Vendor Advisory github.com
Affected: squid-cache squid
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2023-46724?
CVE-2023-46724 has been scored as a high severity vulnerability.
How to fix CVE-2023-46724?
To fix CVE-2023-46724, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2023-46724 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2023-46724 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2023-46724?
CVE-2023-46724 affects squid-cache squid.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.