No advisories yet.
Solution
No solution given by the vendor.
Workaround
To mitigate this issue, users should avoid connecting to untrusted or unknown FTP servers when using applications that rely on the GVfs FTP backend. This vulnerability requires the client to interact with a malicious FTP server for exploitation.
Thu, 26 Feb 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in the FTP GVfs backend. A malicious FTP server can exploit this vulnerability by providing an arbitrary IP address and port in its passive mode (PASV) response. The client unconditionally trusts this information and attempts to connect to the specified endpoint, allowing the malicious server to probe for open ports accessible from the client's network. | |
| Title | Gvfs: gvfs ftp backend: information disclosure via untrusted pasv responses | |
| First Time appeared |
Redhat
Redhat enterprise Linux |
|
| Weaknesses | CWE-918 | |
| CPEs | cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:6 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
| Vendors & Products |
Redhat
Redhat enterprise Linux |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-02-26T15:33:23.865Z
Reserved: 2026-02-26T13:34:41.531Z
Link: CVE-2026-28295
No data.
Status : Received
Published: 2026-02-26T16:24:09.370
Modified: 2026-02-26T16:24:09.370
Link: CVE-2026-28295
No data.
OpenCVE Enrichment
No data.