CVE-2025-24934
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-22

Last updated on: 2026-04-24

Assigner: FreeBSD

Description
Software which sets SO_REUSEPORT_LB on a socket and then connects it to a host will not directly observe any problems. However, due to its membership in a load-balancing group, that socket will receive packets originating from any host. This breaks the contract of the connect(2) and implied connect via sendto(2), and may leave the application vulnerable to spoofing attacks. The kernel failed to check the connection state of sockets when adding them to load-balancing groups. Furthermore, when looking up the destination socket for an incoming packet, the kernel will match a socket belonging to a load-balancing group even if it is connected, in violation of the contract that connected socketsΒ are only supposed to receive packets originating from the connected host.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-22
Last Modified
2026-04-24
Generated
2026-05-07
AI Q&A
2025-10-22
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
freebsd freebsd *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-488 The product does not sufficiently enforce boundaries between the states of different sessions, causing data to be provided to, or used by, the wrong session.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability occurs in FreeBSD's netinet module where the kernel fails to properly check if a socket is connected before adding it to a load-balancing group using the SO_REUSEPORT_LB option. As a result, connected sockets, which should only receive packets from their connected peer, can receive packets from any source within the load-balancing group. This breaks the expected behavior of connect(2) and sendto(2) system calls and can expose applications to spoofing attacks. [1]


How can this vulnerability impact me? :

The vulnerability can allow an attacker to send spoofed packets to a connected socket that should only accept packets from a specific host. This can lead to spoofing attacks where malicious packets are accepted by the application, potentially compromising the integrity and security of the communication and the application relying on the socket. [1]


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, avoid using the SO_REUSEPORT_LB socket option. Additionally, update your FreeBSD system to the latest patched versions released on or after October 22, 2025. You can apply these updates using the freebsd-update utility for binary patches or by applying the provided source code patches and recompiling the kernel. These updates fix the issue by ensuring connected sockets are excluded from load-balancing groups, preventing spoofing attacks. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart