A flaw was found in the FTP GVfs backend. A malicious FTP server can exploit this vulnerability by providing an arbitrary IP address and port in its passive mode (PASV) response. The client unconditionally trusts this information and attempts to connect to the specified endpoint, allowing the malicious server to probe for open ports accessible from the client's network.
Metrics
Affected Vendors & Products
References
History
Thu, 26 Feb 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in the FTP GVfs backend. A malicious FTP server can exploit this vulnerability by providing an arbitrary IP address and port in its passive mode (PASV) response. The client unconditionally trusts this information and attempts to connect to the specified endpoint, allowing the malicious server to probe for open ports accessible from the client's network. | |
| Title | Gvfs: gvfs ftp backend: information disclosure via untrusted pasv responses | |
| First Time appeared |
Redhat
Redhat enterprise Linux |
|
| Weaknesses | CWE-918 | |
| CPEs | cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:6 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
| Vendors & Products |
Redhat
Redhat enterprise Linux |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-02-26T15:33:23.865Z
Reserved: 2026-02-26T13:34:41.531Z
Link: CVE-2026-28295
No data.
Status : Received
Published: 2026-02-26T16:24:09.370
Modified: 2026-02-26T16:24:09.370
Link: CVE-2026-28295
No data.
OpenCVE Enrichment
No data.