Recent pfSense Security Vulnerabilities
Advisories are sent to the following pfSense mailing lists:
A full list of all released pfSense Security Advisories:
How to Update Your System
Please refer to our upgrade guide.
Reporting pfSense Security Vulnerability Information
All pfSense security issues should be reported to the pfSense Security Team. All reports should at least contain:
- A description of the vulnerability.
- What versions of pfSense seem to be affected, if possible.
- Any plausible workaround.
- Example code, if possible.
After this information has been reported the Security Team we will get back to you.
Information Handling Policies
As a general policy, the pfSense Security Team favors full disclosure of vulnerability information after a reasonable delay to permit safe analysis and correction of a vulnerability, as well as appropriate testing of the correction, and appropriate coordination with other affected parties.
The Security Team may bring additional pfSense developers or outside developers into discussion of a submitted security vulnerability if their expertise is required to fully understand or correct the problem. Appropriate discretion will be exercised to minimize unnecessary distribution of information about the submitted vulnerability, and any experts brought in will act in accordance of Security Team policies.
If a pfSense release process is underway, the pfSense Release Engineer may also be notified that a vulnerability exists, and its severity, so that informed decisions may be made regarding the release cycle and any serious security bugs present in software associated with an up-coming release. If requested, the Security Team will not share information regarding the nature of the vulnerability with the Release Engineer, limiting information flow to existence and severity.
Submitters should be careful to explicitly document any special information handling requirements.
If the submitter of a vulnerability is interested in a coordinated disclosure process with the submitter and/or other vendors, this should be indicated explicitly in any submissions. In the absence of explicit requests, the pfSense Security Team will select a disclosure schedule that reflects both a desire for timely disclosure and appropriate testing of any solutions. Submitters should be aware that if the vulnerability is being actively discussed in public forums, and actively exploited, the Security Team may choose not to follow a proposed disclosure timeline in order to provide maximum protection for the user community.