CVE-2026-32136
AdGuard · AdGuard Home
AdGuard Home is vulnerable to an unauthenticated authentication bypass via HTTP/2 cleartext (h2c) upgrades, allowing attackers to process requests as fully authenticated.
Executive summary
A critical authentication bypass in AdGuard Home allows unauthenticated attackers to gain full administrative access by exploiting a flaw in HTTP/2 protocol handling.
Vulnerability
The vulnerability exists in the way AdGuard Home handles HTTP/1.1 requests that upgrade to HTTP/2 cleartext (h2c). The resulting connection bypasses the authentication middleware, allowing all subsequent HTTP/2 requests on that connection to be treated as fully authenticated without any credentials.
Business impact
Attackers can gain complete control over network-wide ad-blocking and DNS settings, enabling them to redirect traffic to malicious sites or disable security protections. The CVSS score of 9.8 reflects the high severity of losing administrative control over a central network security component.
Remediation
Immediate Action: Update AdGuard Home to version 0.107.73 or later to resolve the authentication middleware flaw.
Proactive Monitoring: Check logs for HTTP/1.1 to h2c upgrade requests and review DNS configuration history for unauthorized changes.
Compensating Controls: Disable HTTP/2 cleartext support if possible, or use a reverse proxy that properly handles authentication before passing traffic to the AdGuard Home service.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Immediate patching is required to prevent unauthorized administrative access. Organizations and home users should ensure their AdGuard Home instances are updated to version 0.107.73 and should avoid exposing the management interface to the public internet.