Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-27538


An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.


Published

2023-03-30T20:15:07.677

Last Modified

2025-06-09T15:15:29.150

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 5.5 (MEDIUM)

Weaknesses
  • Type: Secondary
    CWE-305
  • Type: Primary
    CWE-287

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application haxx libcurl < 8.0.0 Yes
Operating System fedoraproject fedora 36 Yes
Operating System debian debian_linux 10.0 Yes
Application netapp active_iq_unified_manager - Yes
Application netapp clustered_data_ontap 9.0 Yes
Operating System broadcom brocade_fabric_operating_system_firmware - Yes
Operating System netapp h300s_firmware - Yes
Hardware netapp h300s - No
Operating System netapp h500s_firmware - Yes
Hardware netapp h500s - No
Operating System netapp h700s_firmware - Yes
Hardware netapp h700s - No
Operating System netapp h410s_firmware - Yes
Hardware netapp h410s - No
Application splunk universal_forwarder < 8.2.12 Yes
Application splunk universal_forwarder < 9.0.6 Yes
Application splunk universal_forwarder 9.1.0 Yes

References