Esta página ainda não foi traduzida para o seu idioma. Exibindo conteúdo em inglês enquanto trabalhamos nisso.
💡 Keep dependencies up to date — most exploits target known, patchable vulnerabilities.
CVE-2026-44195: Authentication Bypass in OPNsense Firewall
Plataforma
linux
Componente
opnsense
Corrigido em
26.1.7
CVE-2026-44195 describes an authentication bypass vulnerability affecting OPNsense Firewall versions 26.1.0 through 26.1.6. This flaw allows an unauthenticated attacker to bypass the account lockout mechanism, potentially enabling brute-force attacks and unauthorized access. The vulnerability is due to a logic error in the lockout handler, which can be exploited by strategically inserting successful login keywords. A fix is available in version 26.1.7.
Impacto e Cenários de Ataquetraduzindo…
The primary impact of CVE-2026-44195 is the potential for unauthorized access to the OPNsense Firewall management interface. By bypassing the lockout mechanism, an attacker can repeatedly attempt login credentials without being blocked, significantly increasing the likelihood of successfully cracking passwords. Successful compromise could allow an attacker to modify firewall rules, redirect traffic, steal sensitive data, or even gain complete control over the network protected by the firewall. This vulnerability is particularly concerning as it doesn't require any prior authentication, making it easily exploitable from external networks.
Contexto de Exploraçãotraduzindo…
As of the publication date (2026-05-13), there is no public evidence of CVE-2026-44195 being actively exploited in the wild. The vulnerability is not currently listed on KEV or EPSS, suggesting a low to medium probability of exploitation. The availability of a straightforward bypass technique, however, warrants prompt patching. Refer to the official OPNsense advisory for further details.
Inteligência de Ameaças
Status do Exploit
CISA SSVC
Vetor CVSS
O que significam essas métricas?
- Attack Vector
- Rede — explorável remotamente pela internet. Sem acesso físico ou local necessário.
- Attack Complexity
- Baixa — sem condições especiais. O atacante pode explorar de forma confiável.
- Privileges Required
- Nenhum — sem autenticação necessária para explorar.
- User Interaction
- Nenhuma — ataque automático e silencioso. A vítima não faz nada.
- Scope
- Inalterado — impacto limitado ao componente vulnerável.
- Confidentiality
- Baixo — acesso parcial ou indireto a alguns dados.
- Integrity
- Nenhum — sem impacto na integridade.
- Availability
- Nenhum — sem impacto na disponibilidade.
Software Afetado
Classificação de Fraqueza (CWE)
Linha do tempo
- Reservado
- Publicada
- Modificada
Mitigação e Soluções Alternativastraduzindo…
The recommended mitigation for CVE-2026-44195 is to immediately upgrade OPNsense Firewall to version 26.1.7 or later. If upgrading is not immediately feasible, consider implementing temporary workarounds such as enabling multi-factor authentication (MFA) on the firewall management interface. Additionally, implement rate limiting on the authentication service to reduce the effectiveness of brute-force attacks. Monitor authentication logs for suspicious activity, specifically looking for unusual username patterns or repeated failed login attempts from the same IP address. After upgrading, confirm the lockout mechanism functions correctly by attempting multiple failed login attempts and verifying the account is locked.
Como corrigirtraduzindo…
Actualice su instancia de OPNsense a la versión 26.1.7 o posterior para mitigar la vulnerabilidad de bypass de bloqueo de autenticación. Esta actualización corrige la lógica defectuosa en el controlador de bloqueo que permite a los atacantes evitar el bloqueo de cuentas.
Perguntas frequentestraduzindo…
What is CVE-2026-44195 — Authentication Bypass in OPNsense Firewall?
CVE-2026-44195 is a medium severity vulnerability in OPNsense Firewall versions 26.1.0 - 26.1.6 that allows an attacker to bypass the account lockout mechanism by injecting crafted usernames, potentially leading to unauthorized access.
Am I affected by CVE-2026-44195 in OPNsense Firewall?
You are affected if you are running OPNsense Firewall version 26.1.0 through 26.1.6. If you are running a later version, you are not vulnerable.
How do I fix CVE-2026-44195 in OPNsense Firewall?
Upgrade your OPNsense Firewall to version 26.1.7 or later. As a temporary workaround, enable multi-factor authentication and implement rate limiting on the authentication service.
Is CVE-2026-44195 being actively exploited?
As of the publication date, there is no public evidence of active exploitation, but the vulnerability's ease of exploitation warrants prompt patching.
Where can I find the official OPNsense advisory for CVE-2026-44195?
Refer to the official OPNsense security advisory on their website: [https://opnsense.org/security/](https://opnsense.org/security/)
Seu projeto está afetado?
Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.
Experimente agora — sem conta
Faça upload de qualquer manifesto (composer.lock, package-lock.json, lista de plugins WordPress…) ou cole sua lista de componentes. Receba um relatório de vulnerabilidades instantaneamente. Fazer upload de um arquivo é só o começo: com uma conta, você obtém monitoramento contínuo, alertas por Slack/email, relatórios multiprojeto e white-label.
Arraste e solte seu arquivo de dependências
composer.lock, package-lock.json, requirements.txt, Gemfile.lock, pubspec.lock, Dockerfile...