MEDIUM · 6.5

CVE-2024-8096

When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems an...

Vulnerability Description

When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems and instead wrongly consider the response as fine. If the returned status reports another error than 'revoked' (like for example 'unauthorized') it is not treated as a bad certficate.

CVSS Score

6.5

MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
LOW
Integrity
LOW
Availability
NONE

Affected Products

VendorProductVersions
HaxxCurl>= 7.41.0, < 8.10.0
DebianDebian Linux11.0
NetappActive Iq Unified Manager-
NetappOntap Select Deploy Administration Utility-
NetappOntap Tools10
NetappBootstrap Os-
NetappHci Compute Node-
NetappH300S Firmware-
NetappH300S-
NetappH410S Firmware-
NetappH410S-
NetappH500S Firmware-
NetappH500S-
NetappH700S Firmware-
NetappH700S-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2024-8096?

CVE-2024-8096 is a vulnerability with a CVSS score of 6.5 (MEDIUM). When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems an...

How severe is CVE-2024-8096?

CVE-2024-8096 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2024-8096?

Check the references section above for vendor advisories and patch information. Affected products include: Haxx Curl, Debian Debian Linux, Netapp Active Iq Unified Manager, Netapp Ontap Select Deploy Administration Utility, Netapp Ontap Tools.