Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2026-3099

Опубликовано: 12 мар. 2026
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS3: 5.8

Описание

A flaw was found in Libsoup. The server-side digest authentication implementation in the SoupAuthDomainDigest class does not properly track issued nonces or enforce the required incrementing nonce-count (nc) attribute. This vulnerability allows a remote attacker to capture a single valid authentication header and replay it repeatedly. Consequently, the attacker can bypass authentication and gain unauthorized access to protected resources, impersonating the legitimate user.

РелизСтатусПримечание
devel

deferred

2026-03-11
esm-infra/bionic

deferred

2026-03-11
esm-infra/focal

deferred

2026-03-11
esm-infra/xenial

deferred

2026-03-11
jammy

deferred

2026-03-11
noble

deferred

2026-03-11
questing

deferred

2026-03-11
upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

deferred

2026-03-11
esm-apps/jammy

deferred

2026-03-11
jammy

deferred

2026-03-11
noble

deferred

2026-03-11
questing

deferred

2026-03-11
upstream

needs-triage

Показывать по

Ссылки на источники

EPSS

Процентиль: 58%
0.00366
Низкий

5.8 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.8
redhat
около 1 месяца назад

A flaw was found in Libsoup. The server-side digest authentication implementation in the SoupAuthDomainDigest class does not properly track issued nonces or enforce the required incrementing nonce-count (nc) attribute. This vulnerability allows a remote attacker to capture a single valid authentication header and replay it repeatedly. Consequently, the attacker can bypass authentication and gain unauthorized access to protected resources, impersonating the legitimate user.

CVSS3: 5.8
nvd
14 дней назад

A flaw was found in Libsoup. The server-side digest authentication implementation in the SoupAuthDomainDigest class does not properly track issued nonces or enforce the required incrementing nonce-count (nc) attribute. This vulnerability allows a remote attacker to capture a single valid authentication header and replay it repeatedly. Consequently, the attacker can bypass authentication and gain unauthorized access to protected resources, impersonating the legitimate user.

msrc
2 дня назад

Libsoup: libsoup: authentication bypass via digest authentication replay attack

CVSS3: 5.8
debian
14 дней назад

A flaw was found in Libsoup. The server-side digest authentication imp ...

CVSS3: 5.8
github
14 дней назад

A flaw was found in Libsoup. The server-side digest authentication implementation in the SoupAuthDomainDigest class does not properly track issued nonces or enforce the required incrementing nonce-count (nc) attribute. This vulnerability allows a remote attacker to capture a single valid authentication header and replay it repeatedly. Consequently, the attacker can bypass authentication and gain unauthorized access to protected resources, impersonating the legitimate user.

EPSS

Процентиль: 58%
0.00366
Низкий

5.8 Medium

CVSS3