Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33526: CWE-416: Use After Free in squid-cache squid

0
Critical
VulnerabilityCVE-2026-33526cvecve-2026-33526cwe-416cwe-826
Published: Thu Mar 26 2026 (03/26/2026, 00:16:12 UTC)
Source: CVE Database V5
Vendor/Project: squid-cache
Product: squid

Description

Squid is a caching proxy for the Web. Prior to version 7.5, due to heap Use-After-Free, Squid is vulnerable to Denial of Service when handling ICP traffic. This problem allows a remote attacker to perform a reliable and repeatable Denial of Service attack against the Squid service using ICP protocol. This attack is limited to Squid deployments that explicitly enable ICP support (i.e. configure non-zero `icp_port`). This problem _cannot_ be mitigated by denying ICP queries using `icp_access` rules. Version 7.5 contains a patch.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 01:16:07 UTC

Technical Analysis

CVE-2026-33526 is a heap-based Use-After-Free vulnerability (CWE-416) in the Squid caching proxy server, specifically triggered when processing ICP traffic. Squid is widely used to cache web content and improve network performance. The vulnerability arises from improper memory management when handling ICP requests, leading to a condition where freed heap memory is accessed again. This memory corruption can be exploited remotely by an attacker sending crafted ICP packets to a Squid server with ICP support enabled (non-zero icp_port). The flaw allows the attacker to cause a Denial of Service by crashing the Squid process or causing it to become unresponsive. Attempts to block ICP queries using icp_access rules do not prevent exploitation, as the vulnerability is triggered before such access controls are applied. The issue is resolved in Squid version 7.5 with a patch that corrects the memory handling logic. The vulnerability does not require authentication or user interaction, making it highly exploitable over the network. Although no known exploits are currently observed in the wild, the critical CVSS score (9.2) reflects the high risk posed by this vulnerability due to its impact on service availability and ease of exploitation.

Potential Impact

The primary impact of CVE-2026-33526 is a Denial of Service condition on Squid proxy servers that have ICP enabled. Organizations relying on Squid for web caching and proxy services may experience service outages or degraded performance, disrupting access to cached web content and potentially impacting dependent applications and users. This can affect enterprise networks, ISPs, and content delivery networks that use Squid to optimize traffic. The inability to mitigate the attack via standard ICP access controls increases the risk of successful exploitation. Extended downtime or repeated crashes could lead to operational disruptions, increased support costs, and potential cascading effects on network infrastructure. While the vulnerability does not allow remote code execution or data compromise, the loss of availability can be critical for organizations with high dependency on Squid proxies for traffic management and security filtering.

Mitigation Recommendations

To mitigate CVE-2026-33526, organizations should upgrade all Squid deployments to version 7.5 or later, where the vulnerability is patched. If immediate upgrade is not feasible, consider disabling ICP support by setting the icp_port to zero, effectively preventing the vulnerable code path from being triggered. Network-level controls such as firewall rules should be implemented to restrict access to the ICP port only to trusted internal hosts, minimizing exposure to external attackers. Monitoring Squid logs for unusual ICP traffic patterns can help detect exploitation attempts. Since icp_access rules do not prevent exploitation, relying solely on these is insufficient. Additionally, organizations should review and harden their proxy configurations to limit unnecessary services and protocols. Regular vulnerability scanning and patch management processes should be enforced to ensure timely updates. Finally, consider deploying network intrusion detection systems capable of identifying malformed ICP packets indicative of exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-20T18:05:11.830Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c4854ef4197a8e3b9c70cd

Added to database: 3/26/2026, 1:01:02 AM

Last enriched: 3/26/2026, 1:16:07 AM

Last updated: 3/26/2026, 3:08:29 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses