Advisory Database
  • Advisories
  • Dependency Scanning
  1. cargo
  2. ›
  3. letmeind
  4. ›
  5. CVE-2025-52570

CVE-2025-52570: letmein connection limiter allows an arbitrary amount of simultaneous connections

June 23, 2025 (updated June 27, 2025)

The connection limiter is implemented incorrectly. It allows an arbitrary amount of simultaneously incoming connections (TCP, UDP and Unix socket) for the services letmeind and letmeinfwd. Therefore, the command line option num-connections is not effective and does not limit the number of simultaneously incoming connections.

letmeind is the public network facing daemon (TCP/UDP).

letmeinfwd is the internal firewall daemon that only listens on local Unix socket.

Possible Denial Of Service by resource exhaustion.

References

  • github.com/advisories/GHSA-jpv7-p47h-f43j
  • github.com/mbuesch/letmein
  • github.com/mbuesch/letmein/commit/43207cd77580410d97165d1e3c07361ba6f3558c
  • github.com/mbuesch/letmein/security/advisories/GHSA-jpv7-p47h-f43j
  • nvd.nist.gov/vuln/detail/CVE-2025-52570

Code Behaviors & Features

Detect and mitigate CVE-2025-52570 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 10.2.1

Fixed versions

  • 10.2.1

Solution

Upgrade to version 10.2.1 or above.

Weakness

  • CWE-770: Allocation of Resources Without Limits or Throttling

Source file

cargo/letmeind/CVE-2025-52570.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 19 Aug 2025 12:18:44 +0000.