CVE-2024-2466
libcurl did not check the server certificate of TLS connections done to a host specified as an IP address, when built to use mbedTLS. libcurl would wrongly avoid using the set hostname function when the specified hostname was given as an IP address, therefore completely skipping the certificate check. This affects all uses of TLS protocols (HTTPS, FTPS, IMAPS, POPS3, SMTPS, etc).
Published
2024-03-27T08:15:41.343
Last Modified
2025-07-30T19:42:21.037
Status
Analyzed
Source
2499f714-1537-4658-8207-48ae4bb9eae9
Severity
CVSSv3.1: 6.5 (MEDIUM)
Weaknesses
Affected Vendors & Products
References
-
http://seclists.org/fulldisclosure/2024/Jul/18
Mailing List, Third Party Advisory
(2499f714-1537-4658-8207-48ae4bb9eae9)
-
http://seclists.org/fulldisclosure/2024/Jul/19
Mailing List, Third Party Advisory
(2499f714-1537-4658-8207-48ae4bb9eae9)
-
http://seclists.org/fulldisclosure/2024/Jul/20
Mailing List, Third Party Advisory
(2499f714-1537-4658-8207-48ae4bb9eae9)
-
http://www.openwall.com/lists/oss-security/2024/03/27/4
Mailing List, Third Party Advisory
(2499f714-1537-4658-8207-48ae4bb9eae9)
-
https://curl.se/docs/CVE-2024-2466.html
Vendor Advisory
(2499f714-1537-4658-8207-48ae4bb9eae9)
-
https://curl.se/docs/CVE-2024-2466.json
Vendor Advisory
(2499f714-1537-4658-8207-48ae4bb9eae9)
-
https://hackerone.com/reports/2416725
Exploit, Issue Tracking, Third Party Advisory
(2499f714-1537-4658-8207-48ae4bb9eae9)
-
https://security.netapp.com/advisory/ntap-20240503-0010/
Third Party Advisory
(2499f714-1537-4658-8207-48ae4bb9eae9)
-
https://support.apple.com/kb/HT214118
Release Notes, Vendor Advisory
(2499f714-1537-4658-8207-48ae4bb9eae9)
-
https://support.apple.com/kb/HT214119
Release Notes, Vendor Advisory
(2499f714-1537-4658-8207-48ae4bb9eae9)
-
https://support.apple.com/kb/HT214120
Release Notes, Vendor Advisory
(2499f714-1537-4658-8207-48ae4bb9eae9)
-
http://seclists.org/fulldisclosure/2024/Jul/18
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://seclists.org/fulldisclosure/2024/Jul/19
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://seclists.org/fulldisclosure/2024/Jul/20
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.openwall.com/lists/oss-security/2024/03/27/4
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://curl.se/docs/CVE-2024-2466.html
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://curl.se/docs/CVE-2024-2466.json
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://hackerone.com/reports/2416725
Exploit, Issue Tracking, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://security.netapp.com/advisory/ntap-20240503-0010/
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://support.apple.com/kb/HT214118
Release Notes, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://support.apple.com/kb/HT214119
Release Notes, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://support.apple.com/kb/HT214120
Release Notes, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.vicarius.io/vsociety/posts/tls-certificate-check-bypass-curl-with-mbedtls-cve-2024-2466-2468
Exploit, Mitigation, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)