Upstream information
Description
Traefik is an open source HTTP reverse proxy and load balancer. When Traefik is configured to use the `HTTPChallenge` to generate and renew the Let's Encrypt TLS certificates, the delay authorized to solve the challenge (50 seconds) can be exploited by attackers to achieve a `slowloris attack`. This vulnerability has been patch in version 2.10.6 and 3.0.0-beta5. Users are advised to upgrade. Users unable to upgrade should replace the `HTTPChallenge` with the `TLSChallenge` or the `DNSChallenge`.SUSE information
Overall state of this security issue: Does not affect SUSE products
This issue is currently rated as having moderate severity.
| CVSS detail | CNA (GitHub) | National Vulnerability Database | 
|---|---|---|
| Base Score | 5.9 | 5.9 | 
| Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H | 
| Attack Vector | Network | Network | 
| Attack Complexity | High | High | 
| Privileges Required | None | None | 
| User Interaction | None | None | 
| Scope | Unchanged | Unchanged | 
| Confidentiality Impact | None | None | 
| Integrity Impact | None | None | 
| Availability Impact | High | High | 
| CVSSv3 Version | 3.1 | 3.1 | 
List of released packages
| Product(s) | Fixed package version(s) | References | 
|---|---|---|
| openSUSE Tumbleweed | 
  |  Patchnames:  openSUSE-Tumbleweed-2024-13506 openSUSE-Tumbleweed-2024-14076  | 
SUSE Timeline for this CVE
CVE page created: Mon Dec 4 23:00:02 2023CVE page last modified: Sun Nov 2 00:00:22 2025