CVE-2024-2466

libcurl did not check the server certificate of TLS connections done to a host specified as an IP address, when built to use mbedTLS. libcurl would wrongly avoid using the set hostname function when the specified hostname was given as an IP address, therefore completely skipping the certificate check. This affects all uses of TLS protocols (HTTPS, FTPS, IMAPS, POPS3, SMTPS, etc).
References
Link Resource
http://seclists.org/fulldisclosure/2024/Jul/18 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2024/Jul/19 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2024/Jul/20 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2024/03/27/4 Mailing List Third Party Advisory
https://curl.se/docs/CVE-2024-2466.html Vendor Advisory
https://curl.se/docs/CVE-2024-2466.json Vendor Advisory
https://hackerone.com/reports/2416725 Exploit Issue Tracking Third Party Advisory
https://security.netapp.com/advisory/ntap-20240503-0010/ Third Party Advisory
https://support.apple.com/kb/HT214118 Release Notes Vendor Advisory
https://support.apple.com/kb/HT214119 Release Notes Vendor Advisory
https://support.apple.com/kb/HT214120 Release Notes Vendor Advisory
http://seclists.org/fulldisclosure/2024/Jul/18 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2024/Jul/19 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2024/Jul/20 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2024/03/27/4 Mailing List Third Party Advisory
https://curl.se/docs/CVE-2024-2466.html Vendor Advisory
https://curl.se/docs/CVE-2024-2466.json Vendor Advisory
https://hackerone.com/reports/2416725 Exploit Issue Tracking Third Party Advisory
https://security.netapp.com/advisory/ntap-20240503-0010/ Third Party Advisory
https://support.apple.com/kb/HT214118 Release Notes Vendor Advisory
https://support.apple.com/kb/HT214119 Release Notes Vendor Advisory
https://support.apple.com/kb/HT214120 Release Notes Vendor Advisory
https://www.vicarius.io/vsociety/posts/tls-certificate-check-bypass-curl-with-mbedtls-cve-2024-2466-2468 Exploit Mitigation Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*

History

30 Jul 2025, 19:42

Type Values Removed Values Added
CPE cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*
References () http://seclists.org/fulldisclosure/2024/Jul/18 - () http://seclists.org/fulldisclosure/2024/Jul/18 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2024/Jul/19 - () http://seclists.org/fulldisclosure/2024/Jul/19 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2024/Jul/20 - () http://seclists.org/fulldisclosure/2024/Jul/20 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2024/03/27/4 - () http://www.openwall.com/lists/oss-security/2024/03/27/4 - Mailing List, Third Party Advisory
References () https://curl.se/docs/CVE-2024-2466.html - () https://curl.se/docs/CVE-2024-2466.html - Vendor Advisory
References () https://curl.se/docs/CVE-2024-2466.json - () https://curl.se/docs/CVE-2024-2466.json - Vendor Advisory
References () https://hackerone.com/reports/2416725 - () https://hackerone.com/reports/2416725 - Exploit, Issue Tracking, Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20240503-0010/ - () https://security.netapp.com/advisory/ntap-20240503-0010/ - Third Party Advisory
References () https://support.apple.com/kb/HT214118 - () https://support.apple.com/kb/HT214118 - Release Notes, Vendor Advisory
References () https://support.apple.com/kb/HT214119 - () https://support.apple.com/kb/HT214119 - Release Notes, Vendor Advisory
References () https://support.apple.com/kb/HT214120 - () https://support.apple.com/kb/HT214120 - Release Notes, Vendor Advisory
References () https://www.vicarius.io/vsociety/posts/tls-certificate-check-bypass-curl-with-mbedtls-cve-2024-2466-2468 - () https://www.vicarius.io/vsociety/posts/tls-certificate-check-bypass-curl-with-mbedtls-cve-2024-2466-2468 - Exploit, Mitigation, Third Party Advisory
First Time Netapp h410s
Netapp h500s
Netapp h700s
Netapp bootstrap Os
Apple macos
Haxx curl
Netapp h500s Firmware
Netapp h300s Firmware
Haxx
Netapp h300s
Netapp h410s Firmware
Apple
Netapp hci Compute Node
Netapp h700s Firmware
Netapp

21 Nov 2024, 09:09

Type Values Removed Values Added
References
  • () https://www.vicarius.io/vsociety/posts/tls-certificate-check-bypass-curl-with-mbedtls-cve-2024-2466-2468 -
References () http://seclists.org/fulldisclosure/2024/Jul/18 - () http://seclists.org/fulldisclosure/2024/Jul/18 -
References () http://seclists.org/fulldisclosure/2024/Jul/19 - () http://seclists.org/fulldisclosure/2024/Jul/19 -
References () http://seclists.org/fulldisclosure/2024/Jul/20 - () http://seclists.org/fulldisclosure/2024/Jul/20 -
References () http://www.openwall.com/lists/oss-security/2024/03/27/4 - () http://www.openwall.com/lists/oss-security/2024/03/27/4 -
References () https://curl.se/docs/CVE-2024-2466.html - () https://curl.se/docs/CVE-2024-2466.html -
References () https://curl.se/docs/CVE-2024-2466.json - () https://curl.se/docs/CVE-2024-2466.json -
References () https://hackerone.com/reports/2416725 - () https://hackerone.com/reports/2416725 -
References () https://security.netapp.com/advisory/ntap-20240503-0010/ - () https://security.netapp.com/advisory/ntap-20240503-0010/ -
References () https://support.apple.com/kb/HT214118 - () https://support.apple.com/kb/HT214118 -
References () https://support.apple.com/kb/HT214119 - () https://support.apple.com/kb/HT214119 -
References () https://support.apple.com/kb/HT214120 - () https://support.apple.com/kb/HT214120 -

23 Aug 2024, 19:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
CWE CWE-297

30 Jul 2024, 02:15

Type Values Removed Values Added
References
  • () http://seclists.org/fulldisclosure/2024/Jul/18 -
  • () http://seclists.org/fulldisclosure/2024/Jul/19 -

30 Jul 2024, 01:15

Type Values Removed Values Added
References
  • () http://seclists.org/fulldisclosure/2024/Jul/20 -

29 Jul 2024, 22:15

Type Values Removed Values Added
References
  • () https://support.apple.com/kb/HT214118 -
  • () https://support.apple.com/kb/HT214119 -
  • () https://support.apple.com/kb/HT214120 -

03 May 2024, 13:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240503-0010/ -

01 May 2024, 17:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/03/27/4 -

27 Mar 2024, 12:29

Type Values Removed Values Added
Summary
  • (es) libcurl no verificó el certificado del servidor de las conexiones TLS realizadas a un host especificado como dirección IP, cuando se creó para usar mbedTLS. libcurl evitaría erróneamente el uso de la función establecer nombre de host cuando el nombre de host especificado se proporcionara como dirección IP, por lo que se saltaría por completo la verificación del certificado. Esto afecta a todos los usos de los protocolos TLS (HTTPS, FTPS, IMAPS, POPS3, SMTPS, etc).

27 Mar 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-27 08:15

Updated : 2025-07-30 19:42


NVD link : CVE-2024-2466

Mitre link : CVE-2024-2466

CVE.ORG link : CVE-2024-2466


JSON object : View

Products Affected

netapp

  • hci_compute_node
  • h700s
  • h500s
  • h410s
  • h410s_firmware
  • h500s_firmware
  • h700s_firmware
  • h300s
  • h300s_firmware
  • bootstrap_os

haxx

  • curl

apple

  • macos
CWE
CWE-297

Improper Validation of Certificate with Host Mismatch