libcurl did not check the server certificate of TLS connections done to a host specified as an IP address, when built to use mbedTLS. libcurl would wrongly avoid using the set hostname function when the specified hostname was given as an IP address, therefore completely skipping the certificate check. This affects all uses of TLS protocols (HTTPS, FTPS, IMAPS, POPS3, SMTPS, etc).
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
History
30 Jul 2025, 19:42
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:* cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:* |
|
First Time |
Netapp hci Compute Node
Netapp h500s Netapp h410s Apple Haxx Apple macos Netapp h700s Firmware Netapp h410s Firmware Netapp Netapp h700s Netapp h300s Netapp bootstrap Os Netapp h300s Firmware Netapp h500s Firmware Haxx curl |
|
References | () http://seclists.org/fulldisclosure/2024/Jul/18 - Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2024/Jul/19 - Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2024/Jul/20 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/03/27/4 - Mailing List, Third Party Advisory | |
References | () https://curl.se/docs/CVE-2024-2466.html - Vendor Advisory | |
References | () https://curl.se/docs/CVE-2024-2466.json - Vendor Advisory | |
References | () https://hackerone.com/reports/2416725 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20240503-0010/ - Third Party Advisory | |
References | () https://support.apple.com/kb/HT214118 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/kb/HT214119 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/kb/HT214120 - Release Notes, Vendor Advisory | |
References | () https://www.vicarius.io/vsociety/posts/tls-certificate-check-bypass-curl-with-mbedtls-cve-2024-2466-2468 - Exploit, Mitigation, Third Party Advisory |
Information
Published : 2024-03-27 08:15
Updated : 2025-07-30 19:42
NVD link : CVE-2024-2466
Mitre link : CVE-2024-2466
CVE.ORG link : CVE-2024-2466
JSON object : View
Products Affected
netapp
- h410s_firmware
- h700s
- hci_compute_node
- h300s
- h500s_firmware
- h500s
- h300s_firmware
- h700s_firmware
- bootstrap_os
- h410s
apple
- macos
haxx
- curl
CWE
CWE-297
Improper Validation of Certificate with Host Mismatch