CWE
299 295
Advisory Published
CVE Published
Updated

CVE-2024-0853: OCSP verification bypass with TLS session reuse

First published: Wed Jan 31 2024(Updated: )

curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (*OCSP stapling*) test failed. A subsequent transfer to the same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check.

Credit: 2499f714-1537-4658-8207-48ae4bb9eae9

Affected SoftwareAffected VersionHow to fix
Curl=8.5.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is the severity of CVE-2024-0853?

    CVE-2024-0853 has been classified with moderate severity due to potential risks in SSL session ID caching.

  • How do I fix CVE-2024-0853?

    To fix CVE-2024-0853, update your curl to version 8.5.1 or later where the caching issue has been resolved.

  • What systems are affected by CVE-2024-0853?

    CVE-2024-0853 affects curl version 8.5.0 that can lead to bypassing SSL verification.

  • Is CVE-2024-0853 a remote code execution vulnerability?

    No, CVE-2024-0853 does not present a remote code execution vulnerability but poses a risk of SSL verification bypass.

  • What can happen if CVE-2024-0853 is exploited?

    If exploited, CVE-2024-0853 may allow a successful connection to a potentially compromised server without proper SSL verification.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203