CVE-2024-8096

When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems and instead wrongly consider the response as fine. If the returned status reports another error than 'revoked' (like for example 'unauthorized') it is not treated as a bad certficate.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:ontap_tools:10:*:*:*:*:vmware_vsphere:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*

History

30 Jul 2025, 19:42

Type Values Removed Values Added
First Time Netapp hci Compute Node
Netapp h500s
Haxx
Debian
Netapp h700s Firmware
Netapp active Iq Unified Manager
Netapp h410s Firmware
Netapp
Netapp ontap Tools
Netapp h500s Firmware
Haxx curl
Netapp h410s
Netapp h700s
Netapp h300s
Netapp bootstrap Os
Netapp ontap Select Deploy Administration Utility
Netapp h300s Firmware
Debian debian Linux
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:a:netapp:ontap_tools:10:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
References () https://curl.se/docs/CVE-2024-8096.html - () https://curl.se/docs/CVE-2024-8096.html - Vendor Advisory
References () https://curl.se/docs/CVE-2024-8096.json - () https://curl.se/docs/CVE-2024-8096.json - Vendor Advisory
References () https://hackerone.com/reports/2669852 - () https://hackerone.com/reports/2669852 - Exploit, Issue Tracking, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2024/09/11/1 - () http://www.openwall.com/lists/oss-security/2024/09/11/1 - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2024/11/msg00008.html - () https://lists.debian.org/debian-lts-announce/2024/11/msg00008.html - Mailing List, Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20241011-0005/ - () https://security.netapp.com/advisory/ntap-20241011-0005/ - Third Party Advisory

Information

Published : 2024-09-11 10:15

Updated : 2025-07-30 19:42


NVD link : CVE-2024-8096

Mitre link : CVE-2024-8096

CVE.ORG link : CVE-2024-8096


JSON object : View

Products Affected

netapp

  • ontap_select_deploy_administration_utility
  • h410s
  • h700s_firmware
  • ontap_tools
  • hci_compute_node
  • h300s
  • active_iq_unified_manager
  • bootstrap_os
  • h500s_firmware
  • h700s
  • h300s_firmware
  • h500s
  • h410s_firmware

debian

  • debian_linux

haxx

  • curl
CWE
CWE-295

Improper Certificate Validation