Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2024-8096


When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems and instead wrongly consider the response as fine. If the returned status reports another error than 'revoked' (like for example 'unauthorized') it is not treated as a bad certficate.


Published

2024-09-11T10:15:02.883

Last Modified

2025-07-30T19:42:16.870

Status

Analyzed

Source

2499f714-1537-4658-8207-48ae4bb9eae9

Severity

CVSSv3.1: 6.5 (MEDIUM)

Weaknesses
  • Type: Secondary
    CWE-295

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application haxx curl < 8.10.0 Yes
Operating System debian debian_linux 11.0 Yes
Application netapp active_iq_unified_manager - Yes
Application netapp ontap_select_deploy_administration_utility - Yes
Application netapp ontap_tools 10 Yes
Operating System netapp bootstrap_os - Yes
Hardware netapp hci_compute_node - No
Operating System netapp h300s_firmware - Yes
Hardware netapp h300s - No
Operating System netapp h410s_firmware - Yes
Hardware netapp h410s - No
Operating System netapp h500s_firmware - Yes
Hardware netapp h500s - No
Operating System netapp h700s_firmware - Yes
Hardware netapp h700s - No

References