CVE-2024-8096

When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems and instead wrongly consider the response as fine. If the returned status reports another error than 'revoked' (like for example 'unauthorized') it is not treated as a bad certficate.

Open
LOW (3.5)
  • T

    Tim Bastin detected CVE-2024-8096 with a risk of 3

  • T

    Tim Bastin detected CVE-2024-8096 with a risk of 3

  • T

    Tim Bastin detected CVE-2024-8096 with a risk of 3

  • T

    Tim Bastin detected CVE-2024-8096 with a risk of 3

  • T

    Tim Bastin detected CVE-2024-8096 with a risk of 3

  • T

    Tim Bastin detected CVE-2024-8096 with a risk of 3

  • T

    Tim Bastin detected CVE-2024-8096 with a risk of 3

  • T

    Tim Bastin detected CVE-2024-8096 with a risk of 3

  • T

    Tim Bastin detected CVE-2024-8096 with a risk of 3

  • T

    Tim Bastin fixed CVE-2024-8096

  • T

    Tim Bastin fixed CVE-2024-8096

  • T

    Tim Bastin fixed CVE-2024-8096

  • T

    Tim Bastin fixed CVE-2024-8096

  • T

    Tim Bastin fixed CVE-2024-8096

  • T

    Tim Bastin fixed CVE-2024-8096

  • T

    Tim Bastin fixed CVE-2024-8096

  • T

    Tim Bastin fixed CVE-2024-8096

  • T

    Tim Bastin fixed CVE-2024-8096

  • T

    Tim Bastin detected CVE-2024-8096 with a risk of 3

  • T

    Tim Bastin detected CVE-2024-8096 with a risk of 3

  • T

    Tim Bastin detected CVE-2024-8096 with a risk of 3

  • T

    Tim Bastin detected CVE-2024-8096 with a risk of 3

  • T

    Tim Bastin detected CVE-2024-8096 with a risk of 3

  • T

    Tim Bastin detected CVE-2024-8096 with a risk of 3

  • T

    Tim Bastin detected CVE-2024-8096 with a risk of 3

  • T

    Tim Bastin detected CVE-2024-8096 with a risk of 3

  • T

    Tim Bastin detected CVE-2024-8096 with a risk of 3

  • logo

    System fixed CVE-2024-8096

  • logo

    System fixed CVE-2024-8096

  • logo

    System fixed CVE-2024-8096

  • logo

    System fixed CVE-2024-8096

  • logo

    System fixed CVE-2024-8096

  • logo

    System fixed CVE-2024-8096

  • logo

    System fixed CVE-2024-8096

  • logo

    System fixed CVE-2024-8096

  • logo

    System fixed CVE-2024-8096

  • logo

    System detected CVE-2024-8096 with a risk of 3

  • logo

    System detected CVE-2024-8096 with a risk of 3

  • logo

    System detected CVE-2024-8096 with a risk of 3

  • logo

    System detected CVE-2024-8096 with a risk of 3

  • logo

    System detected CVE-2024-8096 with a risk of 3

  • logo

    System detected CVE-2024-8096 with a risk of 3

  • logo

    System detected CVE-2024-8096 with a risk of 3

  • logo

    System detected CVE-2024-8096 with a risk of 3

  • logo

    System detected CVE-2024-8096 with a risk of 3

  • logo

    System fixed CVE-2024-8096

  • logo

    System fixed CVE-2024-8096

  • logo

    System fixed CVE-2024-8096

  • logo

    System fixed CVE-2024-8096

  • logo

    System fixed CVE-2024-8096

  • logo

    System fixed CVE-2024-8096

  • logo

    System fixed CVE-2024-8096

  • logo

    System fixed CVE-2024-8096

  • logo

    System fixed CVE-2024-8096

  • logo

    System detected CVE-2024-8096 with a risk of 3

  • logo

    System detected CVE-2024-8096 with a risk of 3

  • logo

    System detected CVE-2024-8096 with a risk of 3

  • logo

    System detected CVE-2024-8096 with a risk of 3

  • logo

    System detected CVE-2024-8096 with a risk of 3

  • logo

    System detected CVE-2024-8096 with a risk of 3

  • logo

    System detected CVE-2024-8096 with a risk of 3

  • logo

    System detected CVE-2024-8096 with a risk of 3

  • logo

    System detected CVE-2024-8096 with a risk of 3

  • T

    Tim Bastin detected CVE-2024-8096 with a risk of 3

  • T

    Tim Bastin

  • logo

    System

  • S

    Sebastian Kawelke updated the risk assessment from 3 to 3.45

    Confidentiality Requirement updated: low -> high

  • S

    Sebastian Kawelke updated the risk assessment from 3 to 3.45

    Confidentiality Requirement updated: low -> high

  • S

    Sebastian Kawelke updated the risk assessment from 3 to 3.45

    Confidentiality Requirement updated: low -> high

  • S

    Sebastian Kawelke updated the risk assessment from 3 to 3.45

    Confidentiality Requirement updated: low -> high

  • logo

    System fixed CVE-2024-8096

  • logo

    System fixed CVE-2024-8096

  • logo

    System fixed CVE-2024-8096

  • logo

    System fixed CVE-2024-8096

  • logo

    System detected CVE-2024-8096 with a risk of 3.46

  • logo

    System updated the risk assessment from 3.46 to 3.45

    System recalculated raw risk assessment

Add a comment

Mark as False Positive
Last calculated at:

Affected component

debian/curl

Installed version:
7.88.1-10
Fixed in:
no patch available

Management decisions across the organization

Copyright © 2025 L3montree GmbH and the DevGuard Contributors. All rights reserved. Version 2ab7b793efd72421aea8c3a994ac60202bf1b3a5