Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2026-4748

Summary
Assigner-freebsd
Assigner Org ID-63664ac6-956c-4cba-a5d0-f46076e16109
Published At-01 Apr, 2026 | 06:18
Updated At-01 Apr, 2026 | 14:56
Rejected At-
Credits

pf silently ignores certain rules

A regression in the way hashes were calculated caused rules containing the address range syntax (x.x.x.x - y.y.y.y) that only differ in the address range(s) involved to be silently dropped as duplicates. Only the first of such rules is actually loaded into pf. Ranges expressed using the address[/mask-bits] syntax were not affected. Some keywords representing actions taken on a packet-matching rule, such as 'log', 'return tll', or 'dnpipe', may suffer from the same issue. It is unlikely that users have such configurations, as these rules would always be redundant. Affected rules are silently ignored, which can lead to unexpected behaviour including over- and underblocking.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:freebsd
Assigner Org ID:63664ac6-956c-4cba-a5d0-f46076e16109
Published At:01 Apr, 2026 | 06:18
Updated At:01 Apr, 2026 | 14:56
Rejected At:
â–¼CVE Numbering Authority (CNA)
pf silently ignores certain rules

A regression in the way hashes were calculated caused rules containing the address range syntax (x.x.x.x - y.y.y.y) that only differ in the address range(s) involved to be silently dropped as duplicates. Only the first of such rules is actually loaded into pf. Ranges expressed using the address[/mask-bits] syntax were not affected. Some keywords representing actions taken on a packet-matching rule, such as 'log', 'return tll', or 'dnpipe', may suffer from the same issue. It is unlikely that users have such configurations, as these rules would always be redundant. Affected rules are silently ignored, which can lead to unexpected behaviour including over- and underblocking.

Affected Products
Vendor
FreeBSD FoundationFreeBSD
Product
FreeBSD
Modules
  • pf
Default Status
unknown
Versions
Affected
  • From 15.0-RELEASE before p5 (release)
  • From 14.4-RELEASE before p1 (release)
  • From 14.3-RELEASE before p10 (release)
Problem Types
TypeCWE IDDescription
CWECWE-480CWE-480: Use of Incorrect Operator
CWECWE-754CWE-754: Improper Check for Unusual or Exceptional Conditions
CWECWE-1023CWE-1023: Incomplete Comparison with Missing Factors
Type: CWE
CWE ID: CWE-480
Description: CWE-480: Use of Incorrect Operator
Type: CWE
CWE ID: CWE-754
Description: CWE-754: Improper Check for Unusual or Exceptional Conditions
Type: CWE
CWE ID: CWE-1023
Description: CWE-1023: Incomplete Comparison with Missing Factors
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

finder
Michael Gmelin
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://security.freebsd.org/advisories/FreeBSD-SA-26:09.pf.asc
vendor-advisory
Hyperlink: https://security.freebsd.org/advisories/FreeBSD-SA-26:09.pf.asc
Resource:
vendor-advisory
â–¼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secteam@freebsd.org
Published At:01 Apr, 2026 | 07:16
Updated At:02 Apr, 2026 | 20:47

A regression in the way hashes were calculated caused rules containing the address range syntax (x.x.x.x - y.y.y.y) that only differ in the address range(s) involved to be silently dropped as duplicates. Only the first of such rules is actually loaded into pf. Ranges expressed using the address[/mask-bits] syntax were not affected. Some keywords representing actions taken on a packet-matching rule, such as 'log', 'return tll', or 'dnpipe', may suffer from the same issue. It is unlikely that users have such configurations, as these rules would always be redundant. Affected rules are silently ignored, which can lead to unexpected behaviour including over- and underblocking.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CPE Matches

FreeBSD Foundation
freebsd
>>freebsd>>Versions from 14.0(inclusive) to 14.4(exclusive)
cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>14.3
cpe:2.3:o:freebsd:freebsd:14.3:-:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>14.3
cpe:2.3:o:freebsd:freebsd:14.3:p1:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>14.3
cpe:2.3:o:freebsd:freebsd:14.3:p2:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>14.3
cpe:2.3:o:freebsd:freebsd:14.3:p3:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>14.3
cpe:2.3:o:freebsd:freebsd:14.3:p4:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>14.3
cpe:2.3:o:freebsd:freebsd:14.3:p5:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>14.3
cpe:2.3:o:freebsd:freebsd:14.3:p6:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>14.3
cpe:2.3:o:freebsd:freebsd:14.3:p7:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>14.3
cpe:2.3:o:freebsd:freebsd:14.3:p8:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>14.3
cpe:2.3:o:freebsd:freebsd:14.3:p9:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>14.4
cpe:2.3:o:freebsd:freebsd:14.4:-:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>14.4
cpe:2.3:o:freebsd:freebsd:14.4:rc1:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>15.0
cpe:2.3:o:freebsd:freebsd:15.0:-:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>15.0
cpe:2.3:o:freebsd:freebsd:15.0:p1:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>15.0
cpe:2.3:o:freebsd:freebsd:15.0:p2:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>15.0
cpe:2.3:o:freebsd:freebsd:15.0:p3:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>15.0
cpe:2.3:o:freebsd:freebsd:15.0:p4:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-480Secondarysecteam@freebsd.org
CWE-754Secondarysecteam@freebsd.org
CWE-1023Secondarysecteam@freebsd.org
CWE ID: CWE-480
Type: Secondary
Source: secteam@freebsd.org
CWE ID: CWE-754
Type: Secondary
Source: secteam@freebsd.org
CWE ID: CWE-1023
Type: Secondary
Source: secteam@freebsd.org
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://security.freebsd.org/advisories/FreeBSD-SA-26:09.pf.ascsecteam@freebsd.org
Vendor Advisory
Hyperlink: https://security.freebsd.org/advisories/FreeBSD-SA-26:09.pf.asc
Source: secteam@freebsd.org
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

10Records found

CVE-2011-2480
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.42% / 61.72%
||
7 Day CHG~0.00%
Published-27 Nov, 2019 | 18:53
Updated-06 Aug, 2024 | 23:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Information Disclosure vulnerability in the 802.11 stack, as used in FreeBSD before 8.2 and NetBSD when using certain non-x86 architectures. A signedness error in the IEEE80211_IOC_CHANINFO ioctl allows a local unprivileged user to cause the kernel to copy large amounts of kernel memory back to the user, disclosing potentially sensitive information.

Action-Not Available
Vendor-NetBSDFreeBSD Foundation
Product-freebsdnetbsdFreeBSDNetBSD
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2024-6760
Matching Score-8
Assigner-FreeBSD
ShareView Details
Matching Score-8
Assigner-FreeBSD
CVSS Score-7.5||HIGH
EPSS-0.25% / 48.15%
||
7 Day CHG~0.00%
Published-11 Aug, 2024 | 02:40
Updated-29 Oct, 2024 | 20:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ktrace(2) fails to detach when executing a setuid binary

A logic bug in the code which disables kernel tracing for setuid programs meant that tracing was not disabled when it should have, allowing unprivileged users to trace and inspect the behavior of setuid programs. The bug may be used by an unprivileged user to read the contents of files to which they would not otherwise have access, such as the local password database.

Action-Not Available
Vendor-FreeBSD Foundation
Product-freebsdFreeBSD
CWE ID-CWE-862
Missing Authorization
CVE-2024-45289
Matching Score-8
Assigner-FreeBSD
ShareView Details
Matching Score-8
Assigner-FreeBSD
CVSS Score-7.5||HIGH
EPSS-0.23% / 45.32%
||
7 Day CHG~0.00%
Published-12 Nov, 2024 | 15:06
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unbounded allocation in ctl(4) CAM Target Layer

The fetch(3) library uses environment variables for passing certain information, including the revocation file pathname. The environment variable name used by fetch(1) to pass the filename to the library was incorrect, in effect ignoring the option. Fetch would still connect to a host presenting a certificate included in the revocation file passed to the --crl option.

Action-Not Available
Vendor-FreeBSD Foundation
Product-FreeBSDfreebsd
CWE ID-CWE-665
Improper Initialization
CVE-2020-7453
Matching Score-6
Assigner-FreeBSD
ShareView Details
Matching Score-6
Assigner-FreeBSD
CVSS Score-6||MEDIUM
EPSS-0.06% / 19.62%
||
7 Day CHG~0.00%
Published-28 Apr, 2020 | 23:36
Updated-04 Aug, 2024 | 09:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In FreeBSD 12.1-STABLE before r359021, 12.1-RELEASE before 12.1-RELEASE-p3, 11.3-STABLE before r359020, and 11.3-RELEASE before 11.3-RELEASE-p7, a missing null termination check in the jail_set configuration option "osrelease" may return more bytes with a subsequent jail_get system call allowing a malicious jail superuser with permission to create nested jails to read kernel memory.

Action-Not Available
Vendor-n/aFreeBSD Foundation
Product-freebsdFreeBSD
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2026-6772
Matching Score-4
Assigner-Mozilla Corporation
ShareView Details
Matching Score-4
Assigner-Mozilla Corporation
CVSS Score-7.5||HIGH
EPSS-0.04% / 11.11%
||
7 Day CHG~0.00%
Published-21 Apr, 2026 | 12:41
Updated-22 Apr, 2026 | 16:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect boundary conditions in the Libraries component in NSS

Incorrect boundary conditions in the Libraries component in NSS. This vulnerability was fixed in Firefox 150, Firefox ESR 115.35, Firefox ESR 140.10, Thunderbird 150, and Thunderbird 140.10.

Action-Not Available
Vendor-Mozilla Corporation
Product-thunderbirdfirefoxFirefoxThunderbird
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2026-6766
Matching Score-4
Assigner-Mozilla Corporation
ShareView Details
Matching Score-4
Assigner-Mozilla Corporation
CVSS Score-7.5||HIGH
EPSS-0.03% / 9.89%
||
7 Day CHG~0.00%
Published-21 Apr, 2026 | 12:40
Updated-22 Apr, 2026 | 14:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect boundary conditions in the Libraries component in NSS

Incorrect boundary conditions in the Libraries component in NSS. This vulnerability was fixed in Firefox 150, Firefox ESR 140.10, Thunderbird 150, and Thunderbird 140.10.

Action-Not Available
Vendor-Mozilla Corporation
Product-thunderbirdfirefoxFirefoxThunderbird
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2025-69250
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-6.6||MEDIUM
EPSS-0.16% / 37.02%
||
7 Day CHG~0.00%
Published-23 Feb, 2026 | 23:45
Updated-25 Feb, 2026 | 16:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
free5GC has Improper Error Handling in UDM, Leading to Information Exposure

free5gc UDM provides Unified Data Management (UDM) for free5GC, an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, the service reliably leaks detailed internal error messages (e.g., strconv.ParseInt parsing errors) to remote clients when processing invalid pduSessionId inputs. This exposes implementation details and can be used for service fingerprinting. All deployments of free5GC using the UDM Nudm_UECM DELETE service may be vulnerable. free5gc/udm pull request 76 contains a fix for the issue. No direct workaround is available at the application level. Applying the official patch is recommended.

Action-Not Available
Vendor-free5gcfree5gc
Product-udmudm
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2026-31790
Matching Score-4
Assigner-OpenSSL Software Foundation
ShareView Details
Matching Score-4
Assigner-OpenSSL Software Foundation
CVSS Score-7.5||HIGH
EPSS-0.02% / 3.97%
||
7 Day CHG-0.01%
Published-07 Apr, 2026 | 22:00
Updated-23 Apr, 2026 | 15:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect Failure Handling in RSA KEM RSASVE Encapsulation

Issue summary: Applications using RSASVE key encapsulation to establish a secret encryption key can send contents of an uninitialized memory buffer to a malicious peer. Impact summary: The uninitialized buffer might contain sensitive data from the previous execution of the application process which leads to sensitive data leakage to an attacker. RSA_public_encrypt() returns the number of bytes written on success and -1 on error. The affected code tests only whether the return value is non-zero. As a result, if RSA encryption fails, encapsulation can still return success to the caller, set the output lengths, and leave the caller to use the contents of the ciphertext buffer as if a valid KEM ciphertext had been produced. If applications use EVP_PKEY_encapsulate() with RSA/RSASVE on an attacker-supplied invalid RSA public key without first validating that key, then this may cause stale or uninitialized contents of the caller-provided ciphertext buffer to be disclosed to the attacker in place of the KEM ciphertext. As a workaround calling EVP_PKEY_public_check() or EVP_PKEY_public_check_quick() before EVP_PKEY_encapsulate() will mitigate the issue. The FIPS modules in 3.6, 3.5, 3.4, 3.3, 3.1 and 3.0 are affected by this issue.

Action-Not Available
Vendor-OpenSSL
Product-opensslOpenSSL
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2021-38599
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.17% / 37.99%
||
7 Day CHG~0.00%
Published-12 Aug, 2021 | 15:01
Updated-04 Aug, 2024 | 01:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

WAL-G before 1.1, when a non-libsodium build (e.g., one of the official binary releases published as GitHub Releases) is used, silently ignores the libsodium encryption key and uploads cleartext backups. This is arguably a Principle of Least Surprise violation because "the user likely wanted to encrypt all file activity."

Action-Not Available
Vendor-wal-g_projectn/a
Product-wal-gn/a
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2023-35849
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.28% / 51.06%
||
7 Day CHG~0.00%
Published-19 Jun, 2023 | 00:00
Updated-11 Dec, 2024 | 17:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

VirtualSquare picoTCP (aka PicoTCP-NG) through 2.1 does not properly check whether header sizes would result in accessing data outside of a packet.

Action-Not Available
Vendor-virtualsquaren/a
Product-picotcpn/a
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
Details not found