CVE-2024-8096
Sept. 11, 2024, 4:26 p.m.
Tags
CVSS Score
Product(s) Impacted
curl
Description
When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems and instead wrongly consider the response as fine. If the returned status reports another error than 'revoked' (like for example 'unauthorized') it is not treated as a bad certficate.
Weaknesses
CWE-295
Improper Certificate Validation
The product does not validate, or incorrectly validates, a certificate.
CWE ID: 295Date
Published: Sept. 11, 2024, 10:15 a.m.
Last Modified: Sept. 11, 2024, 4:26 p.m.
Status : Awaiting Analysis
CVE has been recently published to the CVE List and has been received by the NVD.
More infoSource
2499f714-1537-4658-8207-48ae4bb9eae9
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
Base Score
Exploitability Score
Impact Score
Base Severity
MEDIUMCVSS Vector String
The CVSS vector string provides an in-depth view of the vulnerability metrics.
View Vector StringCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N