Improper Certificate Validation Affecting libcurl package, versions [7.76.0,8.10.0)


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.19% (41st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CONAN-LIBCURL-10076481
  • published8 May 2025
  • disclosed11 Sept 2024
  • creditHiroki Kurosawa

Introduced: 11 Sep 2024

CVE-2024-8096  (opens in a new tab)
CWE-295  (opens in a new tab)

How to fix?

Upgrade libcurl to version 8.10.0 or higher.

Overview

Affected versions of this package are vulnerable to Improper Certificate Validation due to improper validation of OCSP responses. An attacker can mislead the system into accepting an invalid server certificate as valid by exploiting the failure to correctly handle certain OCSP response statuses (like for example "unauthorized").

Note:

This issue only exists when curl is built to use the GnuTLS library.

CVSS Base Scores

version 4.0
version 3.1