CVE-2025-54574

9.3 CRITICAL

📋 TL;DR

Squid caching proxy versions 6.3 and below contain a heap buffer overflow vulnerability in URN processing that could allow remote attackers to execute arbitrary code. This affects all systems running vulnerable Squid versions with URN enabled. Attackers could potentially take control of Squid servers.

💻 Affected Systems

Products:
  • Squid caching proxy
Versions: All versions up to and including 6.3
Operating Systems: All operating systems running Squid
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires URN functionality to be enabled and accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data exfiltration, and lateral movement within the network.

🟠

Likely Case

Service disruption, denial of service, or limited code execution depending on exploit sophistication and system hardening.

🟢

If Mitigated

Denial of service or service disruption if exploit attempts are blocked by security controls.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires sending specially crafted URN requests to vulnerable Squid instances.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.4

Vendor Advisory: https://github.com/squid-cache/squid/security/advisories/GHSA-w4gv-vw3f-29g3

Restart Required: Yes

Instructions:

1. Download Squid 6.4 from official sources. 2. Stop Squid service. 3. Backup configuration. 4. Install new version. 5. Restart Squid service.

🔧 Temporary Workarounds

Disable URN access permissions

all

Prevents exploitation by disabling URN functionality entirely

Edit squid.conf and add: 'deny urn' to appropriate ACL sections or disable URN protocol support

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to Squid servers
  • Deploy WAF or IPS rules to block suspicious URN requests

🔍 How to Verify

Check if Vulnerable:

Check Squid version and verify URN functionality is enabled in configuration

Check Version:

squid -v | grep Version

Verify Fix Applied:

Confirm Squid version is 6.4 or higher and test URN functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual URN request patterns
  • Squid crash logs
  • Memory access violation errors

Network Indicators:

  • Malformed URN requests
  • Unusual traffic to Squid URN ports

SIEM Query:

source="squid" AND (uri="urn:*" OR protocol="URN") AND (status="ERROR" OR status="DENIED")

🔗 References

📤 Share & Export