When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems and instead wrongly consider the response as fine. If the returned status reports another error than 'revoked' (like for example 'unauthorized') it is not treated as a bad certficate.
References
| Link | Resource |
|---|---|
| https://curl.se/docs/CVE-2024-8096.html | Vendor Advisory |
| https://curl.se/docs/CVE-2024-8096.json | Vendor Advisory |
| https://hackerone.com/reports/2669852 | Exploit Issue Tracking Third Party Advisory |
| http://www.openwall.com/lists/oss-security/2024/09/11/1 | Mailing List Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2024/11/msg00008.html | Mailing List Third Party Advisory |
| https://security.netapp.com/advisory/ntap-20241011-0005/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
| AND |
|
Configuration 5 (hide)
| AND |
|
Configuration 6 (hide)
| AND |
|
Configuration 7 (hide)
| AND |
|
Configuration 8 (hide)
| AND |
|
History
30 Jul 2025, 19:42
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Netapp hci Compute Node
Netapp h500s Haxx Debian Netapp h700s Firmware Netapp active Iq Unified Manager Netapp h410s Firmware Netapp Netapp ontap Tools Netapp h500s Firmware Haxx curl Netapp h410s Netapp h700s Netapp h300s Netapp bootstrap Os Netapp ontap Select Deploy Administration Utility Netapp h300s Firmware Debian debian Linux |
|
| CPE | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:a:netapp:ontap_tools:10:*:*:*:*:vmware_vsphere:*:* cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:* cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:* cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:* |
|
| References | () https://curl.se/docs/CVE-2024-8096.html - Vendor Advisory | |
| References | () https://curl.se/docs/CVE-2024-8096.json - Vendor Advisory | |
| References | () https://hackerone.com/reports/2669852 - Exploit, Issue Tracking, Third Party Advisory | |
| References | () http://www.openwall.com/lists/oss-security/2024/09/11/1 - Mailing List, Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2024/11/msg00008.html - Mailing List, Third Party Advisory | |
| References | () https://security.netapp.com/advisory/ntap-20241011-0005/ - Third Party Advisory |
Information
Published : 2024-09-11 10:15
Updated : 2025-07-30 19:42
NVD link : CVE-2024-8096
Mitre link : CVE-2024-8096
CVE.ORG link : CVE-2024-8096
JSON object : View
Products Affected
netapp
- ontap_select_deploy_administration_utility
- h410s
- h700s_firmware
- ontap_tools
- hci_compute_node
- h300s
- active_iq_unified_manager
- bootstrap_os
- h500s_firmware
- h700s
- h300s_firmware
- h500s
- h410s_firmware
debian
- debian_linux
haxx
- curl
CWE
CWE-295
Improper Certificate Validation
