CVE-2026-44601: CWE-837 Improper Enforcement of a Single, Unique Action in torproject Tor
A vulnerability in Tor versions before 0. 4. 9. 7 can cause a client crash due to a double close of a circuit when circuit queue memory pressure exists. This issue is identified as CWE-837, improper enforcement of a single, unique action. The vulnerability has a low severity score and does not impact confidentiality or integrity, only availability. No official patch or remediation guidance is currently provided by the vendor.
AI Analysis
Technical Summary
CVE-2026-44601 describes a low-severity vulnerability in the Tor software prior to version 0.4.9.7. Under conditions of circuit queue memory pressure, the software may improperly perform a double close operation on a circuit, leading to a client crash. This is categorized under CWE-837, which involves improper enforcement of a single, unique action. The CVSS 3.1 base score is 3.7, reflecting a network attack vector with high attack complexity and no privileges or user interaction required, but only causing low impact on availability.
Potential Impact
The vulnerability can cause a denial of service condition by crashing the Tor client when memory pressure occurs on the circuit queue. There is no impact on confidentiality or integrity. No known exploits are reported in the wild at this time.
Mitigation Recommendations
No official patch or remediation level has been published yet. Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until a fix is available, users should monitor for updates from the Tor Project and consider avoiding conditions that cause circuit queue memory pressure if possible.
CVE-2026-44601: CWE-837 Improper Enforcement of a Single, Unique Action in torproject Tor
Description
A vulnerability in Tor versions before 0. 4. 9. 7 can cause a client crash due to a double close of a circuit when circuit queue memory pressure exists. This issue is identified as CWE-837, improper enforcement of a single, unique action. The vulnerability has a low severity score and does not impact confidentiality or integrity, only availability. No official patch or remediation guidance is currently provided by the vendor.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-44601 describes a low-severity vulnerability in the Tor software prior to version 0.4.9.7. Under conditions of circuit queue memory pressure, the software may improperly perform a double close operation on a circuit, leading to a client crash. This is categorized under CWE-837, which involves improper enforcement of a single, unique action. The CVSS 3.1 base score is 3.7, reflecting a network attack vector with high attack complexity and no privileges or user interaction required, but only causing low impact on availability.
Potential Impact
The vulnerability can cause a denial of service condition by crashing the Tor client when memory pressure occurs on the circuit queue. There is no impact on confidentiality or integrity. No known exploits are reported in the wild at this time.
Mitigation Recommendations
No official patch or remediation level has been published yet. Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until a fix is available, users should monitor for updates from the Tor Project and consider avoiding conditions that cause circuit queue memory pressure if possible.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2026-05-07T03:09:50.703Z
- Cvss Version
- 3.1
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69fc1394cbff5d8610732765
Added to database: 5/7/2026, 4:22:44 AM
Last enriched: 5/7/2026, 4:37:36 AM
Last updated: 5/7/2026, 7:04:26 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.