CVE-2025-54574
Squid · Squid
A critical vulnerability has been identified in the Squid web proxy, affecting versions 6.3 and below.
Executive summary
A critical vulnerability has been identified in the Squid web proxy, affecting versions 6.3 and below. This flaw allows a remote attacker to potentially execute arbitrary code on the server by sending a specially crafted web request, which could lead to a complete system compromise. Organizations using affected versions of Squid are at high risk of data breaches, network intrusion, and service disruption.
Vulnerability
The vulnerability is a heap-based buffer overflow within the Squid proxy's function for processing Uniform Resource Names (URNs). Due to incorrect buffer size calculations, an unauthenticated remote attacker can send a malicious, overly long URN request to the proxy. When Squid attempts to process this request, it writes data beyond the allocated memory buffer, corrupting adjacent memory on the heap. A skilled attacker can leverage this memory corruption to overwrite critical program data, leading to a denial of service or, more critically, the execution of arbitrary code with the permissions of the Squid service account.
Business impact
This vulnerability is rated as critical severity with a CVSS score of 9.3, reflecting the high potential for damage. A successful exploit would grant an attacker a foothold within the network perimeter, as proxy servers are often internet-facing and trusted by internal systems. The potential consequences include theft of sensitive data transiting the proxy, pivoting to attack other internal network resources, deploying ransomware, or using the compromised server as a platform to launch further attacks. The compromise of a central proxy server poses a severe risk to the confidentiality, integrity, and availability of the organization's data and IT infrastructure.
Remediation
Immediate Action: The primary remediation step is to upgrade all vulnerable Squid instances to the latest stable version (e.g., version 6.4 or newer) as recommended by the vendor. This should be treated as an emergency change and deployed immediately. After patching, restart the Squid service to ensure the updated code is active.
Proactive Monitoring: Security teams should actively monitor for signs of attempted or successful exploitation. Review Squid access logs for an unusual volume of requests containing "urn:", especially those that appear malformed or excessively long. Monitor network traffic for anomalous outbound connections from the Squid server, which could indicate a post-compromise command-and-control channel. System-level monitoring should alert on unexpected crashes of the Squid process or the spawning of suspicious child processes.
Compensating Controls: If immediate patching is not feasible, implement the following compensating controls to reduce risk:
- Use a Web Application Firewall (WAF) or Intrusion Prevention System (IPS) with rules/signatures designed to detect and block malformed URN requests targeting this vulnerability.
- Apply strict access control lists (ACLs) to limit which client IP addresses can use the proxy service, reducing the attack surface.
- Ensure the Squid service runs as a low-privilege, dedicated user to limit the potential impact of a successful remote code execution exploit.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the critical CVSS score of 9.3 and the risk of remote code execution, this vulnerability represents a significant threat. We strongly recommend that all organizations using affected versions of Squid prioritize the immediate deployment of the vendor-supplied patches. The position of a proxy server on the network edge makes it a prime target for attackers seeking initial access. Do not wait for evidence of active exploitation; patch all vulnerable systems proactively to prevent a potential compromise.