CVE-2025-52570 is a low severity vulnerability with a CVSS score of 0.0. No known exploits currently, and patches are available.
Very low probability of exploitation
EPSS predicts the probability of exploitation in the next 30 days based on real-world threat data, complementing CVSS severity scores with actual risk assessment.
The connection limiter is implemented incorrectly.
It allows an arbitrary amount of simultaneously incoming connections (TCP, UDP and Unix socket) for the services letmeind and letmeinfwd.
Therefore, the command line option num-connections is not effective and does not limit the number of simultaneously incoming connections.
letmeind is the public network facing daemon (TCP/UDP).
letmeinfwd is the internal firewall daemon that only listens on local Unix socket.
Possible Denial Of Service by resource exhaustion.
All versions <= 10.2.0 are affected.
All users shall upgrade to version 10.2.1.
Untested possible workarounds:
letmeind port (default 5800) via firewall.If a (D)DoS is run against the service, something is going to be affected. The connection limiter assures that the effect on the system itself is limited at the expense of the effect on the letmein services itself. So even with the connection limiter active, a (D)DoS can lead to a less responsive or unresponsive letmein service.
Please cite this page when referencing data from Strobes VI. Proper attribution helps support our vulnerability intelligence research.