First published: Wed Nov 06 2024(Updated: )
Last updated 18 November 2024
Credit: 2499f714-1537-4658-8207-48ae4bb9eae9
Affected Software | Affected Version | How to fix |
---|---|---|
debian/curl | <=7.74.0-1.3+deb11u13<=7.74.0-1.3+deb11u14<=7.88.1-10+deb12u8<=7.88.1-10+deb12u5 | 8.11.0-1 |
IBM QRadar WinCollect Agent | <=10.0-10.1.12 | |
Curl | >=7.74.0<8.11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-9681 is considered a moderate severity vulnerability due to its impact on HSTS caching behavior.
To remediate CVE-2024-9681, update curl to version 8.11.0 or later, or ensure your application does not rely on insecure HSTS settings.
CVE-2024-9681 affects curl versions between 7.74.0 and 8.11.0, and it also impacts IBM QRadar WinCollect Agent versions up to 10.1.12.
The root cause of CVE-2024-9681 is the improper handling of HSTS cache entries for subdomains, which can affect the intended expiry time.
CVE-2024-9681 may lead to unintended consequences by allowing a subdomain's expiry time to overwrite that of its parent domain in HSTS configuration.