When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems and instead wrongly consider the response as fine. If the returned status reports another error than 'revoked' (like for example 'unauthorized') it is not treated as a bad certficate.
References
Link | Resource |
---|---|
https://curl.se/docs/CVE-2024-8096.html | Vendor Advisory |
https://curl.se/docs/CVE-2024-8096.json | Vendor Advisory |
https://hackerone.com/reports/2669852 | Exploit Issue Tracking Third Party Advisory |
http://www.openwall.com/lists/oss-security/2024/09/11/1 | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2024/11/msg00008.html | Mailing List Third Party Advisory |
https://security.netapp.com/advisory/ntap-20241011-0005/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
History
30 Jul 2025, 19:42
Type | Values Removed | Values Added |
---|---|---|
First Time |
Netapp active Iq Unified Manager
Netapp h500s Netapp bootstrap Os Netapp h500s Firmware Haxx Netapp ontap Select Deploy Administration Utility Debian Netapp h410s Netapp Netapp h700s Debian debian Linux Haxx curl Netapp h300s Firmware Netapp h300s Netapp h410s Firmware Netapp ontap Tools Netapp hci Compute Node Netapp h700s Firmware |
|
References | () https://curl.se/docs/CVE-2024-8096.html - Vendor Advisory | |
References | () https://curl.se/docs/CVE-2024-8096.json - Vendor Advisory | |
References | () https://hackerone.com/reports/2669852 - Exploit, Issue Tracking, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/09/11/1 - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2024/11/msg00008.html - Mailing List, Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20241011-0005/ - Third Party Advisory | |
CPE | cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:ontap_tools:10:*:*:*:*:vmware_vsphere:*:* cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:* cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:* |
21 Nov 2024, 09:52
Type | Values Removed | Values Added |
---|---|---|
References |
|
11 Sep 2024, 14:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
CWE | CWE-295 | |
Summary |
|
11 Sep 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-11 10:15
Updated : 2025-07-30 19:42
NVD link : CVE-2024-8096
Mitre link : CVE-2024-8096
CVE.ORG link : CVE-2024-8096
JSON object : View
Products Affected
netapp
- ontap_select_deploy_administration_utility
- hci_compute_node
- h700s
- h500s
- h410s
- h410s_firmware
- h500s_firmware
- h700s_firmware
- h300s
- ontap_tools
- h300s_firmware
- active_iq_unified_manager
- bootstrap_os
debian
- debian_linux
haxx
- curl
CWE
CWE-295
Improper Certificate Validation