Denial of service whith ACME HTTPChallenge in Traefik
Description
Traefik is an open source HTTP reverse proxy and load balancer. When Traefik is configured to use the HTTPChallenge to generate and renew the Let's Encrypt TLS certificates, the delay authorized to solve the challenge (50 seconds) can be exploited by attackers to achieve a slowloris attack. This vulnerability has been patch in version 2.10.6 and 3.0.0-beta5. Users are advised to upgrade. Users unable to upgrade should replace the HTTPChallenge with the TLSChallenge or the DNSChallenge.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Traefik HTTPChallenge 50-second timeout enables slowloris-style DoS by keeping connections open; patched in v2.10.6 and v3.0.0-beta5.
Vulnerability
Overview Traefik, an open‑source HTTP reverse proxy and load balancer, configures Let's Encrypt TLS certificates using either HTTPChallenge, TLSChallenge, or DNSChallenge. CVE‑2023‑47124 arises specifically when HTTPChallenge is used. The challenge process imposes a 50‑second delay for solving the token, and this window can be abused by an attacker to perform a slowloris‑style denial‑of‑service attack. By slowly sending partial HTTP requests, the attacker keeps connections open and exhausts server resources, preventing legitimate traffic from being served [1].
Attack
Vector Exploitation requires no authentication and uses standard HTTP semantics; the attacker simply sends incomplete request headers at a low rate within the 50‑second challenge timeout. No special network position is needed beyond the ability to reach the Traefik instance, making this attack surface broad for any public‑facing Traefik deployment using HTTPChallenge for ACME certificate management [1][2].
Impact
A successful slowloris attack tied to this vulnerability can lead to prolonged denial of service, rendering Traefik unable to respond to legitimate requests. Since TLS certificate renewal typically runs periodically, the attack can be repeated or timed to degrade availability without requiring any privilege escalation or code execution [1][3].
Mitigation
The vulnerability is fixed in Traefik versions 2.10.6 and 3.0.0‑beta5. Users on older versions should upgrade to these releases. For those unable to upgrade immediately, the recommended workaround is to replace the HTTPChallenge with either the TLSChallenge or the DNSChallenge, as these methods do not impose the same exploitable delay window [1][4].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/traefik/traefik/v2Go | < 2.10.6 | 2.10.6 |
github.com/traefik/traefik/v3Go | < 3.0.0-beta5 | 3.0.0-beta5 |
Affected products
8- osv-coords7 versionspkg:apk/chainguard/traefikpkg:apk/chainguard/traefik-fipspkg:apk/wolfi/traefikpkg:golang/github.com/traefik/traefik/v2pkg:golang/github.com/traefik/traefik/v3pkg:rpm/opensuse/traefik2&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/traefik&distro=openSUSE%20Tumbleweed
< 2.10.6-r0+ 6 more
- (no CPE)range: < 2.10.6-r0
- (no CPE)range: < 0
- (no CPE)range: < 2.10.6-r0
- (no CPE)range: < 2.10.6
- (no CPE)range: < 3.0.0-beta5
- (no CPE)range: < 2.11.5-1.1
- (no CPE)range: < 2.10.7-1.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- github.com/advisories/GHSA-8g85-whqh-cr2fghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-47124ghsaADVISORY
- doc.traefik.io/traefik/https/acme/ghsax_refsource_MISCWEB
- doc.traefik.io/traefik/https/acme/ghsax_refsource_MISCWEB
- doc.traefik.io/traefik/https/acme/ghsax_refsource_MISCWEB
- github.com/traefik/traefik/releases/tag/v2.10.6ghsax_refsource_MISCWEB
- github.com/traefik/traefik/releases/tag/v3.0.0-beta5ghsax_refsource_MISCWEB
- github.com/traefik/traefik/security/advisories/GHSA-8g85-whqh-cr2fghsax_refsource_CONFIRMWEB
- www.cloudflare.com/learning/ddos/ddos-attack-tools/slowlorisghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.