๐Ÿ” CVE Alert

CVE-2026-4748

HIGH 7.5

pf silently ignores certain rules

CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
7th

A regression in the way hashes were calculated caused rules containing the address range syntax (x.x.x.x - y.y.y.y) that only differ in the address range(s) involved to be silently dropped as duplicates. Only the first of such rules is actually loaded into pf. Ranges expressed using the address[/mask-bits] syntax were not affected. Some keywords representing actions taken on a packet-matching rule, such as 'log', 'return tll', or 'dnpipe', may suffer from the same issue. It is unlikely that users have such configurations, as these rules would always be redundant. Affected rules are silently ignored, which can lead to unexpected behaviour including over- and underblocking.

CWE CWE-480 CWE-754 CWE-1023
Vendor freebsd
Product freebsd
Published Apr 1, 2026
Last Updated Apr 1, 2026
Stay Ahead of the Next One

Get instant alerts for freebsd freebsd

Be the first to know when new high vulnerabilities affecting freebsd freebsd are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

FreeBSD / FreeBSD
15.0-RELEASE < p5 14.4-RELEASE < p1 14.3-RELEASE < p10

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
security.freebsd.org: https://security.freebsd.org/advisories/FreeBSD-SA-26:09.pf.asc

Credits

Michael Gmelin