Home

Description

OPNsense is a FreeBSD based firewall and routing platform. Prior to 26.1.7, a logic flaw in the OPNsense lockout_handler allows an unauthenticated attacker to continuously reset the authentication failure counter for their IP address. By interjecting a crafted username containing a success keyword ("Accepted" or "Successful login") between normal brute-force attempts, an attacker can prevent the failure counter from ever reaching the lockout threshold. This vulnerability is fixed in 26.1.7.

PUBLISHED Reserved 2026-05-05 | Published 2026-05-13 | Updated 2026-05-14 | Assigner GitHub_M




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-307: Improper Restriction of Excessive Authentication Attempts

Product status

< 26.1.7
affected

References

gist.github.com/sopex/b9786e72e2a5d9b1bbd81ed8477c351b exploit

github.com/...e/core/security/advisories/GHSA-h3vx-4q27-rc42

cve.org (CVE-2026-44195)

nvd.nist.gov (CVE-2026-44195)

Download JSON