CVE-2026-44195 PUBLISHED

OPNsense: Authentication lockout bypass

Assigner: GitHub_M
Reserved: 05.05.2026 Published: 13.05.2026 Updated: 13.05.2026

OPNsense is a FreeBSD based firewall and routing platform. Prior to 26.1.7, a logic flaw in the OPNsense lockout_handler allows an unauthenticated attacker to continuously reset the authentication failure counter for their IP address. By interjecting a crafted username containing a success keyword ("Accepted" or "Successful login") between normal brute-force attempts, an attacker can prevent the failure counter from ever reaching the lockout threshold. This vulnerability is fixed in 26.1.7.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS Score: 5.3

Product Status

Vendor opnsense
Product core
Versions
  • Version < 26.1.7 is affected

References

Problem Types

  • CWE-307: Improper Restriction of Excessive Authentication Attempts CWE