CVE-2024-39321

Traefik is an HTTP reverse proxy and load balancer. Versions prior to 2.11.6, 3.0.4, and 3.1.0-rc3 have a vulnerability that allows bypassing IP allow-lists via HTTP/3 early data requests in QUIC 0-RTT handshakes sent with spoofed IP addresses. Versions 2.11.6, 3.0.4, and 3.1.0-rc3 contain a patch for this issue. No known workarounds are available.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*
cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*
cpe:2.3:a:traefik:traefik:3.1.0:-:*:*:*:*:*:*
cpe:2.3:a:traefik:traefik:3.1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:traefik:traefik:3.1.0:rc2:*:*:*:*:*:*

History

25 Nov 2025, 14:08

Type Values Removed Values Added
First Time Traefik
Traefik traefik
CPE cpe:2.3:a:traefik:traefik:3.1.0:rc2:*:*:*:*:*:*
cpe:2.3:a:traefik:traefik:3.1.0:-:*:*:*:*:*:*
cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*
cpe:2.3:a:traefik:traefik:3.1.0:rc1:*:*:*:*:*:*
References () https://github.com/traefik/traefik/releases/tag/v2.11.6 - () https://github.com/traefik/traefik/releases/tag/v2.11.6 - Release Notes
References () https://github.com/traefik/traefik/releases/tag/v3.0.4 - () https://github.com/traefik/traefik/releases/tag/v3.0.4 - Release Notes
References () https://github.com/traefik/traefik/releases/tag/v3.1.0-rc3 - () https://github.com/traefik/traefik/releases/tag/v3.1.0-rc3 - Release Notes
References () https://github.com/traefik/traefik/security/advisories/GHSA-gxrv-wf35-62w9 - () https://github.com/traefik/traefik/security/advisories/GHSA-gxrv-wf35-62w9 - Patch, Vendor Advisory

Information

Published : 2024-07-05 18:15

Updated : 2025-11-25 14:08


NVD link : CVE-2024-39321

Mitre link : CVE-2024-39321

CVE.ORG link : CVE-2024-39321


JSON object : View

Products Affected

traefik

  • traefik
CWE
CWE-639

Authorization Bypass Through User-Controlled Key