First published: Wed Sep 11 2024(Updated: )
cURL libcurl could allow a remote attacker to bypass security restrictions, caused by a flaw when using OCSP stapling to validate server cerficate. By sending a specially crafted request, an attacker could exploit this vulnerability to establish the connection even if the certificate is revoked.
Credit: 2499f714-1537-4658-8207-48ae4bb9eae9 2499f714-1537-4658-8207-48ae4bb9eae9
Affected Software | Affected Version | How to fix |
---|---|---|
debian/curl | <=7.74.0-1.3+deb11u13<=7.74.0-1.3+deb11u11<=7.88.1-10+deb12u7<=7.88.1-10+deb12u5<=8.9.1-2 | 8.10.0-2 |
IBM QRadar WinCollect Agent | <=10.0-10.1.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8096 has been assigned a critical severity rating due to its potential to allow remote attackers to bypass security restrictions.
To fix CVE-2024-8096, upgrade to the recommended version of cURL, which is 8.10.0-2 or higher.
CVE-2024-8096 affects the cURL package on Debian and the IBM QRadar WinCollect Agent up to version 10.1.12.
Yes, CVE-2024-8096 can be exploited by a remote attacker through specially crafted requests that manipulate OCSP stapling.
If CVE-2024-8096 is not addressed, the system may be vulnerable to establishing insecure connections despite invalid server certificates.