CVE-2024-8096

When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems and instead wrongly consider the response as fine. If the returned status reports another error than 'revoked' (like for example 'unauthorized') it is not treated as a bad certficate.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:ontap_tools:10:*:*:*:*:vmware_vsphere:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*

History

30 Jul 2025, 19:42

Type Values Removed Values Added
First Time Netapp active Iq Unified Manager
Netapp h500s
Netapp bootstrap Os
Netapp h500s Firmware
Haxx
Netapp ontap Select Deploy Administration Utility
Debian
Netapp h410s
Netapp
Netapp h700s
Debian debian Linux
Haxx curl
Netapp h300s Firmware
Netapp h300s
Netapp h410s Firmware
Netapp ontap Tools
Netapp hci Compute Node
Netapp h700s Firmware
References () https://curl.se/docs/CVE-2024-8096.html - () https://curl.se/docs/CVE-2024-8096.html - Vendor Advisory
References () https://curl.se/docs/CVE-2024-8096.json - () https://curl.se/docs/CVE-2024-8096.json - Vendor Advisory
References () https://hackerone.com/reports/2669852 - () https://hackerone.com/reports/2669852 - Exploit, Issue Tracking, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2024/09/11/1 - () http://www.openwall.com/lists/oss-security/2024/09/11/1 - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2024/11/msg00008.html - () https://lists.debian.org/debian-lts-announce/2024/11/msg00008.html - Mailing List, Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20241011-0005/ - () https://security.netapp.com/advisory/ntap-20241011-0005/ - Third Party Advisory
CPE cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:ontap_tools:10:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*

21 Nov 2024, 09:52

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/09/11/1 -
  • () https://lists.debian.org/debian-lts-announce/2024/11/msg00008.html -
  • () https://security.netapp.com/advisory/ntap-20241011-0005/ -

11 Sep 2024, 14:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
CWE CWE-295
Summary
  • (es) Cuando se le indica a curl que utilice la extensión TLS de solicitud de estado de certificado, a menudo denominada como grapado OCSP, para verificar que el certificado del servidor es válido, es posible que no detecte algunos problemas de OCSP y, en cambio, considere erróneamente que la respuesta es correcta. Si el estado devuelto informa un error distinto de "revocado" (como, por ejemplo, "no autorizado"), no se trata como un certificado incorrecto.

11 Sep 2024, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-11 10:15

Updated : 2025-07-30 19:42


NVD link : CVE-2024-8096

Mitre link : CVE-2024-8096

CVE.ORG link : CVE-2024-8096


JSON object : View

Products Affected

netapp

  • ontap_select_deploy_administration_utility
  • hci_compute_node
  • h700s
  • h500s
  • h410s
  • h410s_firmware
  • h500s_firmware
  • h700s_firmware
  • h300s
  • ontap_tools
  • h300s_firmware
  • active_iq_unified_manager
  • bootstrap_os

debian

  • debian_linux

haxx

  • curl
CWE
CWE-295

Improper Certificate Validation