CVE-2024-56195

Source
https://cve.org/CVERecord?id=CVE-2024-56195
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-56195.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-56195
Downstream
Published
2025-03-06T12:15:35.373Z
Modified
2026-02-11T13:41:45.214916Z
Severity
  • 6.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L CVSS Calculator
Summary
[none]
Details

Improper Access Control vulnerability in Apache Traffic Server.

This issue affects Apache Traffic Server: from 9.2.0 through 9.2.8, from 10.0.0 through 10.0.3.

Users are recommended to upgrade to version 9.2.9 or 10.0.4, which fixes the issue.

References

Affected packages

Git / github.com/apache/trafficserver

Affected ranges

Affected versions

10.*
10.0.0
10.0.0-rc0
10.0.1
10.0.1-rc0
10.0.1-rc1
10.0.2
10.0.2-rc0
10.0.3
10.0.3-rc0
10.0.3-rc1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-56195.json"