Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-43285 | QUIC in HAProxy 3.1.x before 3.1-dev7, 3.0.x before 3.0.5, and 2.9.x before 2.9.11 allows opening a 0-RTT session with a spoofed IP address. This can bypass the IP allow/block list functionality. |
Tue, 29 Oct 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-290 |
Tue, 15 Oct 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 15 Oct 2024 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | haproxy: Spoofed IP Bypass in HAProxy QUIC Listener 0-RTT Sessions | |
| Weaknesses | CWE-940 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 14 Oct 2024 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | QUIC in HAProxy 3.1.x before 3.1-dev7, 3.0.x before 3.0.5, and 2.9.x before 2.9.11 allows opening a 0-RTT session with a spoofed IP address. This can bypass the IP allow/block list functionality. | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-29T15:16:03.727Z
Reserved: 2024-10-14T00:00:00.000Z
Link: CVE-2024-49214
Updated: 2024-10-15T15:56:06.767Z
Status : Deferred
Published: 2024-10-14T04:15:05.853
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-49214
OpenCVE Enrichment
Updated: 2025-07-12T22:31:54Z
EUVD