CVE-2024-8096
MediumVulnerability Description
When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems and instead wrongly consider the response as fine. If the returned status reports another error than 'revoked' (like for example 'unauthorized') it is not treated as a bad certficate.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Known Affected Software
94 configuration(s) from 3 vendor(s)
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.80.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:8.2.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.53.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.51.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:8.7.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.48.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.52.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:8.2.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.50.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:8.0.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.64.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.65.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.63.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.88.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.79.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.77.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.49.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:8.0.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.50.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.42.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.65.3:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.84.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.82.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.50.3:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:8.4.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:8.5.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.74.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.43.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.55.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.54.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.75.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.69.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:8.1.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.47.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.59.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.70.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.87.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.69.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.61.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.52.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.44.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.56.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.68.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.56.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.62.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.76.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.66.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.72.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.55.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.45.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:8.1.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.81.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.47.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.85.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.67.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.88.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.65.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:8.8.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.79.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.57.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:8.9.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.54.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:8.7.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.73.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.60.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:8.6.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:8.1.2:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.76.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:8.9.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.42.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.50.2:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.64.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.86.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.65.2:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.58.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.78.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.46.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.71.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.49.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.71.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.53.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.83.0:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.83.1:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:7.61.0:*:*:*:*:*:*:*
cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:netapp:ontap_tools:10:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
2024-Sep-CVE-2024-8096
CVE-2024-8096: OCSP stapling bypass with GnuTLS
2025-Apr-CVE-2024-8096
CVE-2024-8096: None
2024-Oct-CVE-2024-8096
CVE-2024-8096: None
2025-Jul-CVE-2024-8096
CVE-2024-8096: None
2025-Mar-CVE-2024-8096
CVE-2024-8096: None
2024-Nov-CVE-2024-8096
CVE-2024-8096: None
CPUJAN2025
Oracle Critical Patch Update Advisory - January 2025
References & Resources
-
https://curl.se/docs/CVE-2024-8096.html2499f714-1537-4658-8207-48ae4bb9eae9 Vendor Advisory
-
https://curl.se/docs/CVE-2024-8096.json2499f714-1537-4658-8207-48ae4bb9eae9 Vendor Advisory
-
https://hackerone.com/reports/26698522499f714-1537-4658-8207-48ae4bb9eae9 Exploit Issue Tracking Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2024/09/11/1af854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2024/11/msg00008.htmlaf854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
-
https://security.netapp.com/advisory/ntap-20241011-0005/af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
Severity Details
Weakness Type (CWE)
Improper Certificate Validation
- Description
- The product does not validate, or incorrectly validates, a certificate.
- Typical Severity
- High
- OWASP Top 10
- A02:2021-Cryptographic Failures
- Abstraction Level
- Base
Key Information
- Published Date
- September 11, 2024
