CVE-2025-24934
BaseFortify
Publication date: 2025-10-22
Last updated on: 2026-04-24
Assigner: FreeBSD
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| freebsd | freebsd | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-488 | The product does not sufficiently enforce boundaries between the states of different sessions, causing data to be provided to, or used by, the wrong session. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in FreeBSD's netinet module where the kernel fails to properly check if a socket is connected before adding it to a load-balancing group using the SO_REUSEPORT_LB option. As a result, connected sockets, which should only receive packets from their connected peer, can receive packets from any source within the load-balancing group. This breaks the expected behavior of connect(2) and sendto(2) system calls and can expose applications to spoofing attacks. [1]
How can this vulnerability impact me? :
The vulnerability can allow an attacker to send spoofed packets to a connected socket that should only accept packets from a specific host. This can lead to spoofing attacks where malicious packets are accepted by the application, potentially compromising the integrity and security of the communication and the application relying on the socket. [1]
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, avoid using the SO_REUSEPORT_LB socket option. Additionally, update your FreeBSD system to the latest patched versions released on or after October 22, 2025. You can apply these updates using the freebsd-update utility for binary patches or by applying the provided source code patches and recompiling the kernel. These updates fix the issue by ensuring connected sockets are excluded from load-balancing groups, preventing spoofing attacks. [1]