CVE Vulnerabilities

CVE-2024-8096

Improper Certificate Validation

Published: Sep 11, 2024 | Modified: Jul 30, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems and instead wrongly consider the response as fine. If the returned status reports another error than revoked (like for example unauthorized) it is not treated as a bad certficate.

Weakness

The product does not validate, or incorrectly validates, a certificate.

Affected Software

NameVendorStart VersionEnd Version
CurlHaxx7.41.0 (including)8.10.0 (excluding)
CurlUbuntudevel*
CurlUbuntuesm-infra/focal*
CurlUbuntufocal*
CurlUbuntujammy*
CurlUbuntunoble*
CurlUbuntuoracular*
CurlUbuntuplucky*
CurlUbuntuquesting*
CurlUbuntutrusty/esm*
CurlUbuntuupstream*

Potential Mitigations

References