Zero Day Monitor
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
975 articles · 105176 vulns · 36/41 feeds (7d)
← Back to list
—
CVE-2026-33515EXPLOITED
Squid · Squid

Squid is a caching proxy for the Web. Prior to version 7.5, due to improper input validation, Squid is vulnerable to out of bounds read when handling ICP traffic. This problem allows a remote attacker

Description

Squid is a caching proxy for the Web. Prior to version 7.5, due to improper input validation, Squid is vulnerable to out of bounds read when handling ICP traffic. This problem allows a remote attacker to receive small amounts of memory potentially containing sensitive information when responding with errors to invalid ICP requests. This attack is limited to Squid deployments that explicitly enable ICP support (i.e. configure non-zero `icp_port`). This problem cannot be mitigated by denying ICP queries using `icp_access` rules. Version 7.5 contains a patch.

Affected Products

VendorProductVersions
SquidSquid3.5.28, 4.17, 5.9, 6.14, 7.4, < 7.5

References

  • https://github.com/squid-cache/squid/commit/8138e909d2058d4401e0ad49b583afaec912b165
  • https://github.com/squid-cache/squid/pull/2220
  • https://github.com/squid-cache/squid/pull/2220#discussion_r2727683637
  • https://github.com/squid-cache/squid/security/advisories/GHSA-84p4-hcx7-jj7c
  • http://www.openwall.com/lists/oss-security/2026/03/25/4

Related News (1 articles)

Tier A
Microsoft MSRC-1091s ago
CVE-2026-33515 Squid has issues in ICP message handling
→ No new info (linked only)
CISA KEV❌ No
Actively exploited✅ Yes
CWECWE-125, CWE-1289
Published3/26/2026
Last enriched7h agov2
Tags
denial of serviceicpout of bounds readcache protocol
Trending Score56
Source articles1
Independent1
Info Completeness8/14
Missing: cvss, epss, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Pin to Dashboard

Verification

State: verified
Confidence: 100%

Version History

v2
Last enriched 7h ago
v2Tier C7h ago

Added vendor and product information, updated affected versions, changed severity to HIGH, and marked the vulnerability as actively exploited with an exploit available.

vendorproductaffectedVersionspatchAvailable
via oss-security
v19h ago

Initial creation