CVE-2024-2379

libcurl skips the certificate verification for a QUIC connection under certain conditions, when built to use wolfSSL. If told to use an unknown/bad cipher or curve, the error path accidentally skips the verification and returns OK, thus ignoring any certificate problems.
References
Link Resource
http://seclists.org/fulldisclosure/2024/Jul/18 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2024/Jul/19 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2024/Jul/20 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2024/03/27/2 Mailing List Third Party Advisory
https://curl.se/docs/CVE-2024-2379.html Vendor Advisory
https://curl.se/docs/CVE-2024-2379.json Vendor Advisory
https://hackerone.com/reports/2410774 Exploit Issue Tracking Third Party Advisory
https://security.netapp.com/advisory/ntap-20240531-0001/ Third Party Advisory
https://support.apple.com/kb/HT214118 Release Notes Vendor Advisory
https://support.apple.com/kb/HT214119 Release Notes Vendor Advisory
https://support.apple.com/kb/HT214120 Release Notes Vendor Advisory
http://seclists.org/fulldisclosure/2024/Jul/18 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2024/Jul/19 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2024/Jul/20 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2024/03/27/2 Mailing List Third Party Advisory
https://curl.se/docs/CVE-2024-2379.html Vendor Advisory
https://curl.se/docs/CVE-2024-2379.json Vendor Advisory
https://hackerone.com/reports/2410774 Exploit Issue Tracking Third Party Advisory
https://security.netapp.com/advisory/ntap-20240531-0001/ Third Party Advisory
https://support.apple.com/kb/HT214118 Release Notes Vendor Advisory
https://support.apple.com/kb/HT214119 Release Notes Vendor Advisory
https://support.apple.com/kb/HT214120 Release Notes Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:haxx:curl:8.6.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h610c:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:netapp:h615c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h615c:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*

History

30 Jul 2025, 19:42

Type Values Removed Values Added
CPE cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h615c:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h610c:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h615c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:8.6.0:*:*:*:*:*:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
CWE CWE-295
First Time Netapp active Iq Unified Manager
Netapp h500s
Netapp bootstrap Os
Netapp h610c
Netapp h610s Firmware
Netapp h500s Firmware
Haxx
Netapp h615c
Apple
Netapp ontap Select Deploy Administration Utility
Netapp
Netapp h410s
Netapp h615c Firmware
Netapp h700s
Apple macos
Netapp h610s
Haxx curl
Netapp h300s Firmware
Netapp h300s
Netapp h410s Firmware
Netapp hci Compute Node
Netapp h700s Firmware
Netapp h610c Firmware
References () http://seclists.org/fulldisclosure/2024/Jul/18 - () http://seclists.org/fulldisclosure/2024/Jul/18 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2024/Jul/19 - () http://seclists.org/fulldisclosure/2024/Jul/19 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2024/Jul/20 - () http://seclists.org/fulldisclosure/2024/Jul/20 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2024/03/27/2 - () http://www.openwall.com/lists/oss-security/2024/03/27/2 - Mailing List, Third Party Advisory
References () https://curl.se/docs/CVE-2024-2379.html - () https://curl.se/docs/CVE-2024-2379.html - Vendor Advisory
References () https://curl.se/docs/CVE-2024-2379.json - () https://curl.se/docs/CVE-2024-2379.json - Vendor Advisory
References () https://hackerone.com/reports/2410774 - () https://hackerone.com/reports/2410774 - Exploit, Issue Tracking, Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20240531-0001/ - () https://security.netapp.com/advisory/ntap-20240531-0001/ - Third Party Advisory
References () https://support.apple.com/kb/HT214118 - () https://support.apple.com/kb/HT214118 - Release Notes, Vendor Advisory
References () https://support.apple.com/kb/HT214119 - () https://support.apple.com/kb/HT214119 - Release Notes, Vendor Advisory
References () https://support.apple.com/kb/HT214120 - () https://support.apple.com/kb/HT214120 - Release Notes, Vendor Advisory

21 Nov 2024, 09:09

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2024/Jul/18 - () http://seclists.org/fulldisclosure/2024/Jul/18 -
References () http://seclists.org/fulldisclosure/2024/Jul/19 - () http://seclists.org/fulldisclosure/2024/Jul/19 -
References () http://seclists.org/fulldisclosure/2024/Jul/20 - () http://seclists.org/fulldisclosure/2024/Jul/20 -
References () http://www.openwall.com/lists/oss-security/2024/03/27/2 - () http://www.openwall.com/lists/oss-security/2024/03/27/2 -
References () https://curl.se/docs/CVE-2024-2379.html - () https://curl.se/docs/CVE-2024-2379.html -
References () https://curl.se/docs/CVE-2024-2379.json - () https://curl.se/docs/CVE-2024-2379.json -
References () https://hackerone.com/reports/2410774 - () https://hackerone.com/reports/2410774 -
References () https://security.netapp.com/advisory/ntap-20240531-0001/ - () https://security.netapp.com/advisory/ntap-20240531-0001/ -
References () https://support.apple.com/kb/HT214118 - () https://support.apple.com/kb/HT214118 -
References () https://support.apple.com/kb/HT214119 - () https://support.apple.com/kb/HT214119 -
References () https://support.apple.com/kb/HT214120 - () https://support.apple.com/kb/HT214120 -

14 Nov 2024, 20:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.3

30 Jul 2024, 02:15

Type Values Removed Values Added
References
  • () http://seclists.org/fulldisclosure/2024/Jul/18 -
  • () http://seclists.org/fulldisclosure/2024/Jul/19 -

30 Jul 2024, 01:15

Type Values Removed Values Added
References
  • () http://seclists.org/fulldisclosure/2024/Jul/20 -

29 Jul 2024, 22:15

Type Values Removed Values Added
References
  • () https://support.apple.com/kb/HT214118 -
  • () https://support.apple.com/kb/HT214119 -
  • () https://support.apple.com/kb/HT214120 -

10 Jun 2024, 16:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240531-0001/ -

01 May 2024, 19:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/03/27/2 -

27 Mar 2024, 12:29

Type Values Removed Values Added
Summary
  • (es) libcurl omite la verificación del certificado para una conexión QUIC bajo ciertas condiciones, cuando está diseñado para usar wolfSSL. Si se le indica que utilice un cifrado o curva desconocido/incorrecto, la ruta de error omite accidentalmente la verificación y devuelve OK, ignorando así cualquier problema de certificado.

27 Mar 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-27 08:15

Updated : 2025-07-30 19:42


NVD link : CVE-2024-2379

Mitre link : CVE-2024-2379

CVE.ORG link : CVE-2024-2379


JSON object : View

Products Affected

netapp

  • h500s
  • h500s_firmware
  • h300s_firmware
  • h610s
  • h700s
  • h610s_firmware
  • h615c
  • active_iq_unified_manager
  • bootstrap_os
  • hci_compute_node
  • h410s
  • h410s_firmware
  • h610c_firmware
  • h615c_firmware
  • ontap_select_deploy_administration_utility
  • h610c
  • h700s_firmware
  • h300s

apple

  • macos

haxx

  • curl
CWE
CWE-295

Improper Certificate Validation