Changeflow GovPing Data Privacy & Cybersecurity Multiple Squid Vulnerabilities Affect Data Conf...
Priority review Notice Amended Final

Multiple Squid Vulnerabilities Affect Data Confidentiality and Availability

Favicon for www.cert.ssi.gouv.fr CERT-FR Security Advisories
Published March 25th, 2026
Detected March 25th, 2026
Email

Summary

CERT-FR has issued an advisory regarding multiple vulnerabilities discovered in Squid software, affecting versions prior to 7.5. These vulnerabilities can lead to remote denial-of-service attacks and data confidentiality breaches. Users are advised to consult the vendor's security bulletins for patch information.

What changed

CERT-FR, the French national cybersecurity agency, has issued an advisory (CERTFR-2026-AVI-0350) detailing multiple critical vulnerabilities in the Squid web proxy caching software. The vulnerabilities, identified by CVE-2026-32748, CVE-2026-33515, and CVE-2026-33526, affect Squid versions prior to 7.5. Successful exploitation can result in remote denial-of-service (DoS) conditions and unauthorized access to sensitive data, compromising both the availability and confidentiality of systems.

Organizations utilizing Squid software must immediately assess their versions and apply the necessary patches or updates as recommended by the Squid project's security advisories (GHSA-84p4-hcx7-jj7c, GHSA-f9p7-3jqg-hhvq, GHSA-hpfx-h48q-gvwg). Failure to do so could expose their networks to significant security risks, including service disruptions and data exfiltration. While no specific compliance deadline is provided, prompt remediation is crucial to mitigate these threats.

What to do next

  1. Identify all instances of Squid software versions prior to 7.5.
  2. Consult Squid security advisories GHSA-84p4-hcx7-jj7c, GHSA-f9p7-3jqg-hhvq, and GHSA-hpfx-h48q-gvwg.
  3. Apply vendor-provided patches or upgrade Squid to a secure version.

Source document (simplified)

Premier Ministre S.G.D.S.N

Agence nationale
de la sécurité des
systèmes d'information

Paris, le 25 mars 2026 N° CERTFR-2026-AVI-0350 Affaire suivie par: CERT-FR

Avis du CERT-FR

Objet: Multiples vulnérabilités dans Squid

Gestion du document

| Référence | CERTFR-2026-AVI-0350 |
| Titre | Multiples vulnérabilités dans Squid |
| Date de la première version | 25 mars 2026 |
| Date de la dernière version | 25 mars 2026 |
| Source(s) | Bulletin de sécurité Squid GHSA-84p4-hcx7-jj7c du 25 mars 2026
Bulletin de sécurité Squid GHSA-f9p7-3jqg-hhvq du 25 mars 2026
Bulletin de sécurité Squid GHSA-hpfx-h48q-gvwg du 25 mars 2026 |
Une gestion de version détaillée se trouve à la fin de ce document.


Risques

  • Atteinte à la confidentialité des données
  • Déni de service à distance

Systèmes affectés

  • squid versions antérieures à 7.5

Résumé

De multiples vulnérabilités ont été découvertes dans Squid. Elles permettent à un attaquant de provoquer un déni de service à distance et une atteinte à la confidentialité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Documentation


Gestion détaillée du document

  1. le 25 mars 2026 Version initiale

Named provisions

Risques Systèmes affectés Résumé Solutions Documentation

Source

Analysis generated by AI. Source diff and links are from the original.

Classification

Agency
CERT-FR
Published
March 25th, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
CERTFR-2026-AVI-0350

Who this affects

Applies to
Technology companies
Industry sector
5112 Software & Technology
Activity scope
Network Security Proxy Caching
Threshold
Squid versions prior to 7.5
Geographic scope
France FR

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Data Privacy Network Security

Get Data Privacy & Cybersecurity alerts

Weekly digest. AI-summarized, no noise.

Free. Unsubscribe anytime.

Get alerts for this source

We'll email you when CERT-FR Security Advisories publishes new changes.

Free. Unsubscribe anytime.