Loading
In pfSense 2.4.4_1, blocking of source IP addresses on the basis of failed HTTPS authentication is inconsistent with blocking of source IP addresses on the basis of failed SSH authentication (the behavior does not match the sshguard documentation), which might make it easier for attackers to bypass intended access restrictions.
Use Netgate vendor hub and Pfsense product page to widen CVE-2018-20799 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2020-21487, CVE-2023-48123 and CVE-2023-42326 for nearby disclosures in the same product family.