Home / CVE DB / CVE-2024-8096
Standard
Vulnerability Identifier

CVE-2024-8096

2024-09-11
Severity Assessment
6.5
MEDIUM
CVSS v3.x Score
Clinical Analysis (Description)

When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems and instead wrongly consider the response as fine. If the returned status reports another error than 'revoked' (like for example 'unauthorized') it is not treated as a bad certficate.

Vector Sequencing

Attack Parameters

Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Impact Consequences

Technical Impact

Unchanged
Scope
Low
Confidentiality
Low
Integrity
None
Availability
AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Weakness Classification

CWE-CWE-295

Affected Population

Affected Configurations

Total: 94 detected entries

Software List Scrollable
ha
curl
Vendor: haxx • v7.80.0
ha
curl
Vendor: haxx • v8.2.0
ha
curl
Vendor: haxx • v7.53.0
ha
curl
Vendor: haxx • v7.51.0
ha
curl
Vendor: haxx • v8.7.0
ha
curl
Vendor: haxx • v7.48.0
ne
bootstrap_os
Vendor: netapp • v-
ha
curl
Vendor: haxx • v7.52.1
ha
curl
Vendor: haxx • v8.2.1
ha
curl
Vendor: haxx • v7.50.0
ha
curl
Vendor: haxx • v8.0.0
ha
curl
Vendor: haxx • v7.64.0
ha
curl
Vendor: haxx • v7.65.0
ha
curl
Vendor: haxx • v7.63.0
ha
curl
Vendor: haxx • v7.88.1
ha
curl
Vendor: haxx • v7.79.1
ne
active_iq_unified_manager
Vendor: netapp • v-
ha
curl
Vendor: haxx • v7.77.0
ha
curl
Vendor: haxx • v7.49.0
ha
curl
Vendor: haxx • v8.0.1
ha
curl
Vendor: haxx • v7.50.1
ha
curl
Vendor: haxx • v7.42.0
ha
curl
Vendor: haxx • v7.65.3
ha
curl
Vendor: haxx • v7.84.0
ha
curl
Vendor: haxx • v7.82.0
ha
curl
Vendor: haxx • v7.50.3
ne
ontap_tools
Vendor: netapp • v10
ha
curl
Vendor: haxx • v8.4.0
ha
curl
Vendor: haxx • v8.5.0
ha
curl
Vendor: haxx • v7.74.0
ha
curl
Vendor: haxx • v7.43.0
ha
curl
Vendor: haxx • v7.55.1
ne
h700s_firmware
Vendor: netapp • v-
ha
curl
Vendor: haxx • v7.54.0
ha
curl
Vendor: haxx • v7.75.0
ha
curl
Vendor: haxx • v7.69.1
ha
curl
Vendor: haxx • v8.1.1
ha
curl
Vendor: haxx • v7.47.1
ha
curl
Vendor: haxx • v7.59.0
ha
curl
Vendor: haxx • v7.70.0
ha
curl
Vendor: haxx • v7.87.0
ha
curl
Vendor: haxx • v7.41.0
ha
curl
Vendor: haxx • v7.69.0
ha
curl
Vendor: haxx • v7.61.1
ha
curl
Vendor: haxx • v7.52.0
ha
curl
Vendor: haxx • v7.44.0
ha
curl
Vendor: haxx • v7.56.0
ne
h500s_firmware
Vendor: netapp • v-
ha
curl
Vendor: haxx • v7.68.0
ne
h410s_firmware
Vendor: netapp • v-
ha
curl
Vendor: haxx • v7.56.1
ha
curl
Vendor: haxx • v7.62.0
ha
curl
Vendor: haxx • v7.76.1
ha
curl
Vendor: haxx • v7.66.0
ha
curl
Vendor: haxx • v7.72.0
ha
curl
Vendor: haxx • v7.55.0
ha
curl
Vendor: haxx • v7.45.0
ha
curl
Vendor: haxx • v8.1.0
ha
curl
Vendor: haxx • v7.81.0
ha
curl
Vendor: haxx • v7.47.0
ha
curl
Vendor: haxx • v7.85.0
ha
curl
Vendor: haxx • v7.67.0
ha
curl
Vendor: haxx • v7.88.0
ha
curl
Vendor: haxx • v7.65.1
ha
curl
Vendor: haxx • v8.8.0
ha
curl
Vendor: haxx • v7.79.0
ha
curl
Vendor: haxx • v7.57.0
ha
curl
Vendor: haxx • v8.9.0
de
debian_linux
Vendor: debian • v11.0
ha
curl
Vendor: haxx • v7.54.1
ha
curl
Vendor: haxx • v8.7.1
ha
curl
Vendor: haxx • v7.73.0
ne
h300s_firmware
Vendor: netapp • v-
ha
curl
Vendor: haxx • v7.60.0
ha
curl
Vendor: haxx • v8.6.0
ha
curl
Vendor: haxx • v8.1.2
ha
curl
Vendor: haxx • v7.76.0
ha
curl
Vendor: haxx • v8.9.1
ha
curl
Vendor: haxx • v7.42.1
ha
curl
Vendor: haxx • v7.50.2
ha
curl
Vendor: haxx • v7.64.1
ha
curl
Vendor: haxx • v7.86.0
ha
curl
Vendor: haxx • v7.65.2
ha
curl
Vendor: haxx • v7.58.0
ha
curl
Vendor: haxx • v7.78.0
ha
curl
Vendor: haxx • v7.46.0
ha
curl
Vendor: haxx • v7.71.1
ha
curl
Vendor: haxx • v7.49.1
ne
ontap_select_deploy_administration_utility
Vendor: netapp • v-
ha
curl
Vendor: haxx • v7.71.0
ha
curl
Vendor: haxx • v7.53.1
ha
curl
Vendor: haxx • v7.83.0
ha
curl
Vendor: haxx • v7.83.1
ha
curl
Vendor: haxx • v7.61.0
Timeline

Time Line

PUBLICATION
11 Sep 2024
MODIFICATION
30 Jul 2025
FIRST PATCH
11 Oct 2025
Impact Statistics

Key Metrics

CVSS Score
6.5
MEDIUM
Products
94
Affected
Patches
7
Available
Remediation Protocol

Recommended Solution

No automatic solution found. Check vendor references.
Recommended Actions for Administrators

Immediate Action Plan

1. Inventory

Identify all affected systems in your infrastructure.

2. Assessment

Assess exposure and criticality for your organization.

3. Mitigation

Apply patches or available workarounds.

4. Verification

Test and confirm effectiveness of applied measures.