Key Exchange without Entity Authentication Affecting libcurl-debuginfo package, versions <0:8.15.0-4.amzn2023.0.1


Severity

Recommended
0.0
medium
0
10

Based on Amazon Linux security rating.

Threat Intelligence

EPSS
0.02% (5th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-AMZN2023-LIBCURLDEBUGINFO-14905115
  • published9 Jan 2026
  • disclosed7 Nov 2025

Introduced: 7 Nov 2025

CVE-2025-10966  (opens in a new tab)
CWE-322  (opens in a new tab)

How to fix?

Upgrade Amazon-Linux:2023 libcurl-debuginfo to version 0:8.15.0-4.amzn2023.0.1 or higher.
This issue was patched in ALAS2023-2025-1351.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libcurl-debuginfo package and not the libcurl-debuginfo package as distributed by Amazon-Linux. See How to fix? for Amazon-Linux:2023 relevant fixed versions and status.

curl's code for managing SSH connections when SFTP was done using the wolfSSH powered backend was flawed and missed host verification mechanisms.

This prevents curl from detecting MITM attackers and more.

CVSS Base Scores

version 3.1