CVE Vulnerabilities

CVE-2024-0853

Improper Certificate Validation

Published: Feb 03, 2024 | Modified: Jun 20, 2025
CVSS 3.x
5.3
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
3.8 LOW
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (OCSP stapling) test failed. A subsequent transfer to the same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check.

Weakness

The product does not validate, or incorrectly validates, a certificate.

Affected Software

NameVendorStart VersionEnd Version
CurlHaxx8.5.0 (including)8.5.0 (including)
CurlUbuntubionic*
CurlUbuntudevel*
CurlUbuntunoble*
CurlUbuntutrusty*
CurlUbuntuxenial*

Potential Mitigations

References