CVE-2026-44601
LOW
3,7
Source: [email protected]
Attack Vector: network
Attack Complexity: high
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: none
Availability: low
Description
AI Translation Available
Tor before 0.4.9.7, when circuit queue memory pressure exists, can experience a client crash because of a double close of a circuit, aka TROVE-2026-009.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,0004
Percentile
0,1th
Updated
EPSS Score Trend (Last 2 Days)
837
Improper Enforcement of a Single, Unique Action
IncompleteCommon Consequences
Security Scopes Affected:
Other
Potential Impacts:
Varies By Context
Applicable Platforms
Technologies:
Not Technology-Specific, Web Based, Web Server
Application
Tor by Torproject
Version Range Affected
To
0.4.9.7
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:torproject:tor:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://forum.torproject.org/c/news/tor-release-announcement/28
https://gitlab.torproject.org/tpo/core/tor/-/commit/d4e3f6a440b58c2be661decf20c…
https://gitlab.torproject.org/tpo/core/tor/-/work_items/41237
https://www.openwall.com/lists/oss-security/2026/05/06/8