Zero Day Monitor
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
1189 articles · 105242 vulns · 38/41 feeds (7d)
← Back to list
7.5
CVE-2026-33526EXPLOITED
Squid · Squid

Squid is a caching proxy for the Web. Prior to version 7.5, due to heap Use-After-Free, Squid is vulnerable to Denial of Service when handling ICP traffic. This problem allows a remote attacker to per

Description

Squid is a caching proxy for the Web. Prior to version 7.5, due to heap Use-After-Free, Squid is vulnerable to Denial of Service when handling ICP traffic. This problem allows a remote attacker to perform a reliable and repeatable Denial of Service attack against the Squid service using ICP protocol. This attack is limited to Squid deployments that explicitly enable ICP support (i.e. configure non-zero `icp_port`). This problem _cannot_ be mitigated by denying ICP queries using `icp_access` rules. Version 7.5 contains a patch.

Affected Products

VendorProductVersions
SquidSquid3.5.28, 4.17, 5.9, 6.14, 7.4

References

  • https://github.com/squid-cache/squid/commit/8a7d42f9d44befb8fcbbb619505587c8de6a1e91
  • https://github.com/squid-cache/squid/security/advisories/GHSA-hpfx-h48q-gvwg
  • http://www.openwall.com/lists/oss-security/2026/03/25/2

Related News (3 articles)

Tier A
Microsoft MSRC4h ago
CVE-2026-33526 Squid vulnerable to Denial of Service in ICP Request handling
→ No new info (linked only)
Tier B
BSI Advisories1d ago
[UPDATE] [hoch] Squid: Mehrere Schwachstellen ermöglichen Denial of Service
→ No new info (linked only)
Tier C
oss-security2d ago
[ADVISORY] SQUID-2026:1 Denial of Service in ICP Request handling (CVE-2026-33526)
→ No new info (linked only)
CVSS 3.17.5 HIGH
CISA KEV❌ No
Actively exploited✅ Yes
CWECWE-416, CWE-826
Published3/26/2026
Last enriched4h agov3
Trending Score61
Source articles3
Independent3
Info Completeness10/14
Missing: epss, kev, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Pin to Dashboard

Verification

State: verified
Confidence: 100%

Version History

v3
Last enriched 4h ago
v3Tier C4h ago

Updated severity to HIGH, added CVSS estimate of 7.5, and marked exploit as available and actively exploited.

severitycvssEstimateexploitAvailableactivelyExploited
via oss-security
v2Tier C12h ago

Added vendor and product information, updated affected versions, changed severity to HIGH, and marked exploit as available and actively exploited.

vendorproductaffectedVersionspatchAvailable
via oss-security
v114h ago

Initial creation