๐Ÿ” CVE Alert

CVE-2026-4247

HIGH 7.5

TCP: remotely exploitable DoS vector (mbuf leak)

CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
1th

When a challenge ACK is to be sent tcp_respond() constructs and sends the challenge ACK and consumes the mbuf that is passed in. When no challenge ACK should be sent the function returns and leaks the mbuf. If an attacker is either on path with an established TCP connection, or can themselves establish a TCP connection, to an affected FreeBSD machine, they can easily craft and send packets which meet the challenge ACK criteria and cause the FreeBSD host to leak an mbuf for each crafted packet in excess of the configured rate limit settings i.e. with default settings, crafted packets in excess of the first 5 sent within a 1s period will leak an mbuf. Technically, off-path attackers can also exploit this problem by guessing the IP addresses, TCP port numbers and in some cases the sequence numbers of established connections and spoofing packets towards a FreeBSD machine, but this is harder to do effectively.

CWE CWE-401
Vendor freebsd
Product freebsd
Published Mar 26, 2026
Last Updated Mar 26, 2026
Stay Ahead of the Next One

Get instant alerts for freebsd freebsd

Be the first to know when new high vulnerabilities affecting freebsd freebsd are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

FreeBSD / FreeBSD
15.0-RELEASE < p5 14.4-RELEASE < p1 14.3-RELEASE < p10

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
security.freebsd.org: https://security.freebsd.org/advisories/FreeBSD-SA-26:06.tcp.asc

Credits

Michael Tuexen (Netflix)