Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-49214: n/a

0
Medium
VulnerabilityCVE-2024-49214cvecve-2024-49214
Published: Mon Oct 14 2024 (10/14/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-49214 is a medium severity vulnerability in the QUIC implementation of HAProxy versions 2. 9. x before 2. 9. 11, 3. 0. x before 3. 0. 5, and 3. 1.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:24:40 UTC

Technical Analysis

The vulnerability identified as CVE-2024-49214 affects the QUIC protocol implementation in HAProxy versions 2.9.x prior to 2.9.11, 3.0.x prior to 3.0.5, and 3.1.x prior to 3.1-dev7. QUIC is a transport layer network protocol designed to improve performance and security for web traffic. In this case, the flaw allows an attacker to initiate a 0-RTT (zero round-trip time) session using a spoofed IP address. Normally, HAProxy uses IP allow/block lists as a security control to restrict or permit traffic based on source IP addresses. However, due to this vulnerability, the IP address verification can be bypassed during the 0-RTT session establishment phase, allowing unauthorized connections that should have been blocked. This issue arises because the 0-RTT mechanism accepts early data before full handshake completion, and the implementation does not properly validate the source IP against the configured access control lists at this stage. The vulnerability is classified under CWE-290 (Authentication Bypass by Spoofing) and does not require any privileges or user interaction to exploit. Although no active exploitation has been reported, the flaw poses a risk to environments relying on IP-based filtering for security. The CVSS v3.1 base score is 5.3, indicating a medium severity level, with the vector highlighting low attack complexity, network attack vector, no privileges required, no user interaction, and impact limited to integrity (bypassing access control).

Potential Impact

This vulnerability can undermine the effectiveness of IP allow/block lists, a common security control used to restrict access to sensitive services or networks. By bypassing these controls, attackers can gain unauthorized access to backend systems or services protected by HAProxy, potentially leading to unauthorized data manipulation or lateral movement within the network. Although confidentiality and availability are not directly impacted, the integrity of access control is compromised, which can facilitate further attacks or unauthorized activities. Organizations that rely heavily on IP-based filtering for perimeter defense or internal segmentation are particularly at risk. The ease of exploitation without authentication or user interaction increases the threat level, especially in environments exposed to untrusted networks. The lack of known exploits in the wild suggests limited current impact, but the vulnerability should be addressed promptly to prevent future abuse. Failure to mitigate this issue could lead to compliance violations and increased risk of breach in regulated industries.

Mitigation Recommendations

1. Upgrade HAProxy to the latest patched versions: 2.9.11 or later, 3.0.5 or later, and 3.1-dev7 or later where this vulnerability is fixed. 2. If immediate patching is not feasible, consider disabling QUIC support in HAProxy to eliminate the attack vector related to 0-RTT sessions. 3. Implement additional layers of access control beyond IP filtering, such as mutual TLS authentication or application-layer authentication, to reduce reliance on IP-based controls. 4. Monitor HAProxy logs for unusual 0-RTT session attempts or unexpected source IP addresses to detect potential exploitation attempts. 5. Employ network-level protections like firewall rules or intrusion detection systems to restrict traffic to trusted sources and detect spoofing attempts. 6. Review and tighten IP allow/block list configurations to ensure they are as restrictive as possible. 7. Conduct regular security assessments and penetration testing focusing on HAProxy configurations and QUIC protocol usage to identify residual risks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-14T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b7eb7ef31ef0b555f28

Added to database: 2/25/2026, 9:37:02 PM

Last enriched: 2/26/2026, 12:24:40 AM

Last updated: 2/26/2026, 8:03:45 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats