Zero Day Monitor
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
1098 articles · 105223 vulns · 38/41 feeds (7d)
← Back to list
—
CVE-2026-33515EXPLOITED
Squid · Squid

Squid is a caching proxy for the Web. Prior to version 7.5, due to improper input validation, Squid is vulnerable to out of bounds read when handling ICP traffic. This problem allows a remote attacker

Description

Squid is a caching proxy for the Web. Prior to version 7.5, due to improper input validation, Squid is vulnerable to out of bounds read when handling ICP traffic. This problem allows a remote attacker to receive small amounts of memory potentially containing sensitive information when responding with errors to invalid ICP requests. This attack is limited to Squid deployments that explicitly enable ICP support (i.e. configure non-zero `icp_port`). This problem cannot be mitigated by denying ICP queries using `icp_access` rules. Version 7.5 contains a patch.

Affected Products

VendorProductVersions
SquidSquid3.5.28, 4.17, 5.9, 6.14, 7.4, < 7.5

References

  • https://github.com/squid-cache/squid/commit/8138e909d2058d4401e0ad49b583afaec912b165
  • https://github.com/squid-cache/squid/pull/2220
  • https://github.com/squid-cache/squid/pull/2220#discussion_r2727683637
  • https://github.com/squid-cache/squid/security/advisories/GHSA-84p4-hcx7-jj7c
  • http://www.openwall.com/lists/oss-security/2026/03/25/4

Related News (2 articles)

Tier A
Microsoft MSRC1h ago
CVE-2026-33515 Squid has issues in ICP message handling
→ No new info (linked only)
Tier C
oss-security2d ago
[ADVISORY] SQUID-2026:3 Out of Bounds Read in ICP message handling (CVE-2026-33515)
→ No new info (linked only)
CISA KEV❌ No
Actively exploited✅ Yes
CWECWE-125, CWE-1289
Published3/26/2026
Last enriched1h agov3
Tags
denial of serviceicpout of bounds readcache protocol
Trending Score58
Source articles2
Independent2
Info Completeness9/14
Missing: cvss, epss, kev, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Pin to Dashboard

Verification

State: verified
Confidence: 100%

Version History

v3
Last enriched 1h ago
v3Tier C1h ago

Updated severity from NONE to HIGH.

severity
via oss-security
v2Tier C9h ago

Added vendor and product information, updated affected versions, changed severity to HIGH, and marked the vulnerability as actively exploited with an exploit available.

vendorproductaffectedVersionspatchAvailable
via oss-security
v111h ago

Initial creation