CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-0853

High Severity
Haxx
SVRS
52/100

CVSSv3
5.3/10

EPSS
0.0016/1

CVE-2024-0853 is a security vulnerability in curl that could allow attackers to bypass SSL certificate verification. This flaw arises because curl incorrectly cached SSL session IDs, even when OCSP stapling verification failed. Subsequent connections to the same hostname could then skip crucial verify status checks. The SVRS score of 52 indicates a moderate risk, but the presence of the 'In The Wild' tag suggests potential exploitation. This certificate bypass could lead to man-in-the-middle attacks and compromised data. While the CVSS score might appear moderate, the potential for exploitation in real-world scenarios makes addressing CVE-2024-0853 important for systems using affected versions of curl. The CWE-295 classification further emphasizes the issue stemming from improper certificate validation.

In The Wild
CVSS:3.1
AV:N
AC:L
PR:N
UI:N
S:U
C:N
I:L
A:N
2024-02-03

2024-05-03
Eye Icon
SOCRadar
AI Insight

Description:

CVE-2024-0853 is a vulnerability in curl, a command-line tool and library for transferring data over a network. The vulnerability allows an attacker to bypass the SSL verification process and establish a connection to a server that is not trusted. This could allow an attacker to intercept and modify data that is being transferred between the client and the server. The SVRS for this vulnerability is 44, indicating a moderate risk.

Key Insights:

  1. The vulnerability is caused by a flaw in the way curl handles SSL session IDs. When curl connects to a server, it stores the SSL session ID in a cache. If the connection is successful, curl will use the cached session ID for subsequent connections to the same server. However, if the connection fails, curl will not remove the session ID from the cache. This means that an attacker could potentially use a previously cached session ID to connect to a server, even if the server's certificate has been revoked or compromised.
  2. The vulnerability could allow an attacker to impersonate a legitimate server and intercept data that is being transferred between the client and the server. This could allow the attacker to steal sensitive information, such as passwords or credit card numbers.
  3. The vulnerability is particularly dangerous because it can be exploited without the user's knowledge. An attacker could simply send a malicious link to a victim, and if the victim clicks on the link, the attacker could potentially exploit the vulnerability to gain access to the victim's computer.

Mitigation Strategies:

  1. Update curl to the latest version. The latest version of curl (7.87.0) fixes the vulnerability. Users should update to the latest version as soon as possible.
  2. Disable SSL session caching. Users can disable SSL session caching by setting the CURLOPT_SSL_SESSIONID_CACHE option to false. This will prevent curl from caching SSL session IDs, which will make it more difficult for an attacker to exploit the vulnerability.
  3. Use a firewall to block connections to untrusted servers. Users can use a firewall to block connections to untrusted servers. This will help to prevent attackers from exploiting the vulnerability to gain access to the user's computer.

Additional Information:

  • The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about the vulnerability, calling for immediate and necessary measures.
  • There are active exploits for the vulnerability. Attackers are actively exploiting the vulnerability to target organizations.
  • Users who have additional queries regarding this incident can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

No news found for this CVE

Social Media

No tweets found for this CVE

Affected Software

Configuration 1
TypeVendorProduct
AppHaxxcurl

References

ReferenceLink
2499F714-1537-4658-8207-48AE4BB9EAE9https://curl.se/docs/CVE-2024-0853.html
2499F714-1537-4658-8207-48AE4BB9EAE9https://curl.se/docs/CVE-2024-0853.json
2499F714-1537-4658-8207-48AE4BB9EAE9https://hackerone.com/reports/2298922
2499F714-1537-4658-8207-48AE4BB9EAE9https://curl.se/docs/CVE-2024-0853.html
2499F714-1537-4658-8207-48AE4BB9EAE9https://curl.se/docs/CVE-2024-0853.json
2499F714-1537-4658-8207-48AE4BB9EAE9https://hackerone.com/reports/2298922
2499F714-1537-4658-8207-48AE4BB9EAE9https://security.netapp.com/advisory/ntap-20240307-0004/
2499F714-1537-4658-8207-48AE4BB9EAE9https://curl.se/docs/CVE-2024-0853.html
2499F714-1537-4658-8207-48AE4BB9EAE9https://curl.se/docs/CVE-2024-0853.json
2499F714-1537-4658-8207-48AE4BB9EAE9https://hackerone.com/reports/2298922
2499F714-1537-4658-8207-48AE4BB9EAE9https://security.netapp.com/advisory/ntap-20240307-0004/
2499F714-1537-4658-8207-48AE4BB9EAE9https://security.netapp.com/advisory/ntap-20240426-0009/
2499F714-1537-4658-8207-48AE4BB9EAE9https://curl.se/docs/CVE-2024-0853.html
2499F714-1537-4658-8207-48AE4BB9EAE9https://curl.se/docs/CVE-2024-0853.json
2499F714-1537-4658-8207-48AE4BB9EAE9https://hackerone.com/reports/2298922
2499F714-1537-4658-8207-48AE4BB9EAE9https://security.netapp.com/advisory/ntap-20240307-0004/
2499F714-1537-4658-8207-48AE4BB9EAE9https://security.netapp.com/advisory/ntap-20240426-0009/
2499F714-1537-4658-8207-48AE4BB9EAE9https://security.netapp.com/advisory/ntap-20240503-0012/

CWE Details

CWE IDCWE NameDescription
CWE-295Improper Certificate ValidationThe software does not validate, or incorrectly validates, a certificate.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence