Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2017-2629

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-27 Jul, 2018 | 19:00
Updated At-05 Aug, 2024 | 14:02
Rejected At-
Credits

curl before 7.53.0 has an incorrect TLS Certificate Status Request extension feature that asks for a fresh proof of the server's certificate's validity in the code that checks for a test success or failure. It ends up always thinking there's valid proof, even when there is none or if the server doesn't support the TLS extension in question. This could lead to users not detecting when a server's certificate goes invalid or otherwise be mislead that the server is in a better shape than it is in reality. This flaw also exists in the command line tool (--cert-status).

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:27 Jul, 2018 | 19:00
Updated At:05 Aug, 2024 | 14:02
Rejected At:
▼CVE Numbering Authority (CNA)

curl before 7.53.0 has an incorrect TLS Certificate Status Request extension feature that asks for a fresh proof of the server's certificate's validity in the code that checks for a test success or failure. It ends up always thinking there's valid proof, even when there is none or if the server doesn't support the TLS extension in question. This could lead to users not detecting when a server's certificate goes invalid or otherwise be mislead that the server is in a better shape than it is in reality. This flaw also exists in the command line tool (--cert-status).

Affected Products
Vendor
CURLCURL
Product
curl
Versions
Affected
  • 7.53.0
Problem Types
TypeCWE IDDescription
CWECWE-295CWE-295
Type: CWE
CWE ID: CWE-295
Description: CWE-295
Metrics
VersionBase scoreBase severityVector
3.04.3MEDIUM
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Version: 3.0
Base score: 4.3
Base severity: MEDIUM
Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securityfocus.com/bid/96382
vdb-entry
x_refsource_BID
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2629
x_refsource_CONFIRM
http://www.securitytracker.com/id/1037871
vdb-entry
x_refsource_SECTRACK
https://www.tenable.com/security/tns-2017-09
x_refsource_CONFIRM
https://curl.haxx.se/docs/adv_20170222.html
x_refsource_CONFIRM
https://security.gentoo.org/glsa/201703-04
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://www.securityfocus.com/bid/96382
Resource:
vdb-entry
x_refsource_BID
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2629
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securitytracker.com/id/1037871
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: https://www.tenable.com/security/tns-2017-09
Resource:
x_refsource_CONFIRM
Hyperlink: https://curl.haxx.se/docs/adv_20170222.html
Resource:
x_refsource_CONFIRM
Hyperlink: https://security.gentoo.org/glsa/201703-04
Resource:
vendor-advisory
x_refsource_GENTOO
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securityfocus.com/bid/96382
vdb-entry
x_refsource_BID
x_transferred
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2629
x_refsource_CONFIRM
x_transferred
http://www.securitytracker.com/id/1037871
vdb-entry
x_refsource_SECTRACK
x_transferred
https://www.tenable.com/security/tns-2017-09
x_refsource_CONFIRM
x_transferred
https://curl.haxx.se/docs/adv_20170222.html
x_refsource_CONFIRM
x_transferred
https://security.gentoo.org/glsa/201703-04
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://www.securityfocus.com/bid/96382
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2629
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securitytracker.com/id/1037871
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: https://www.tenable.com/security/tns-2017-09
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://curl.haxx.se/docs/adv_20170222.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://security.gentoo.org/glsa/201703-04
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:27 Jul, 2018 | 19:29
Updated At:09 Oct, 2019 | 23:26

curl before 7.53.0 has an incorrect TLS Certificate Status Request extension feature that asks for a fresh proof of the server's certificate's validity in the code that checks for a test success or failure. It ends up always thinking there's valid proof, even when there is none or if the server doesn't support the TLS extension in question. This could lead to users not detecting when a server's certificate goes invalid or otherwise be mislead that the server is in a better shape than it is in reality. This flaw also exists in the command line tool (--cert-status).

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.06.5MEDIUM
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Secondary3.04.3MEDIUM
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Primary2.04.0MEDIUM
AV:N/AC:L/Au:S/C:N/I:P/A:N
Type: Primary
Version: 3.0
Base score: 6.5
Base severity: MEDIUM
Vector:
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Type: Secondary
Version: 3.0
Base score: 4.3
Base severity: MEDIUM
Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Type: Primary
Version: 2.0
Base score: 4.0
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:S/C:N/I:P/A:N
CPE Matches

CURL
haxx
>>curl>>Versions before 7.53.0(exclusive)
cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-295Primarynvd@nist.gov
CWE-295Secondarysecalert@redhat.com
CWE ID: CWE-295
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-295
Type: Secondary
Source: secalert@redhat.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.securityfocus.com/bid/96382secalert@redhat.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1037871secalert@redhat.com
Third Party Advisory
VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2629secalert@redhat.com
Issue Tracking
Patch
Third Party Advisory
https://curl.haxx.se/docs/adv_20170222.htmlsecalert@redhat.com
Vendor Advisory
https://security.gentoo.org/glsa/201703-04secalert@redhat.com
Third Party Advisory
https://www.tenable.com/security/tns-2017-09secalert@redhat.com
Third Party Advisory
Hyperlink: http://www.securityfocus.com/bid/96382
Source: secalert@redhat.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id/1037871
Source: secalert@redhat.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2629
Source: secalert@redhat.com
Resource:
Issue Tracking
Patch
Third Party Advisory
Hyperlink: https://curl.haxx.se/docs/adv_20170222.html
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: https://security.gentoo.org/glsa/201703-04
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: https://www.tenable.com/security/tns-2017-09
Source: secalert@redhat.com
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

21Records found

CVE-2018-16840
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.32% / 54.05%
||
7 Day CHG~0.00%
Published-31 Oct, 2018 | 18:00
Updated-17 Apr, 2025 | 13:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A heap use-after-free flaw was found in curl versions from 7.59.0 through 7.61.1 in the code related to closing an easy handle. When closing and cleaning up an 'easy' handle in the `Curl_close()` function, the library code first frees a struct (without nulling the pointer) and might then subsequently erroneously write to a struct field within that already freed struct.

Action-Not Available
Vendor-Canonical Ltd.CURL
Product-curlubuntu_linuxcurl
CWE ID-CWE-416
Use After Free
CVE-2017-7468
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.70% / 71.17%
||
7 Day CHG~0.00%
Published-16 Jul, 2018 | 13:00
Updated-05 Aug, 2024 | 16:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In curl and libcurl 7.52.0 to and including 7.53.1, libcurl would attempt to resume a TLS session even if the client certificate had changed. That is unacceptable since a server by specification is allowed to skip the client certificate check on resume, and may instead use the old identity which was established by the previous certificate (or no certificate). libcurl supports by default the use of TLS session id/ticket to resume previous TLS sessions to speed up subsequent TLS handshakes. They are used when for any reason an existing TLS connection couldn't be kept alive to make the next handshake faster. This flaw is a regression and identical to CVE-2016-5419 reported on August 3rd 2016, but affecting a different version range.

Action-Not Available
Vendor-[UNKNOWN]CURL
Product-libcurlcurl
CWE ID-CWE-295
Improper Certificate Validation
CVE-2024-32928
Matching Score-6
Assigner-Google Devices
ShareView Details
Matching Score-6
Assigner-Google Devices
CVSS Score-5.9||MEDIUM
EPSS-0.06% / 17.41%
||
7 Day CHG~0.00%
Published-19 Aug, 2024 | 16:38
Updated-14 Mar, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The libcurl CURLOPT_SSL_VERIFYPEER option was disabled on a subset of requests made by Nest production devices which enabled a potential man-in-the-middle attack on requests to Google cloud services by any host the traffic was routed through.

Action-Not Available
Vendor-CURLGoogle LLC
Product-nest_mininest_mini_firmwarelibcurlNest Speakers
CWE ID-CWE-295
Improper Certificate Validation
CVE-2024-2379
Matching Score-6
Assigner-curl
ShareView Details
Matching Score-6
Assigner-curl
CVSS Score-6.3||MEDIUM
EPSS-0.21% / 42.79%
||
7 Day CHG~0.00%
Published-27 Mar, 2024 | 07:56
Updated-30 Jul, 2025 | 19:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
QUIC certificate check bypass with wolfSSL

libcurl skips the certificate verification for a QUIC connection under certain conditions, when built to use wolfSSL. If told to use an unknown/bad cipher or curve, the error path accidentally skips the verification and returns OK, thus ignoring any certificate problems.

Action-Not Available
Vendor-Apple Inc.CURLNetApp, Inc.
Product-hci_compute_nodeh610ch300s_firmwaremacosh300sactive_iq_unified_managerh410s_firmwareh500s_firmwareh700sh410sbootstrap_osh700s_firmwarecurlh610sh610c_firmwareh500sontap_select_deploy_administration_utilityh610s_firmwareh615c_firmwareh615ccurl
CWE ID-CWE-295
Improper Certificate Validation
CVE-2024-8096
Matching Score-6
Assigner-curl
ShareView Details
Matching Score-6
Assigner-curl
CVSS Score-6.5||MEDIUM
EPSS-0.20% / 42.55%
||
7 Day CHG~0.00%
Published-11 Sep, 2024 | 10:03
Updated-30 Jul, 2025 | 19:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OCSP stapling bypass with GnuTLS

When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems and instead wrongly consider the response as fine. If the returned status reports another error than 'revoked' (like for example 'unauthorized') it is not treated as a bad certficate.

Action-Not Available
Vendor-Debian GNU/LinuxCURLNetApp, Inc.
Product-bootstrap_osh410sh300s_firmwarecurlh500sontap_select_deploy_administration_utilityh410s_firmwareh300sh700sactive_iq_unified_managerontap_toolsdebian_linuxh700s_firmwareh500s_firmwarehci_compute_nodecurlcurl
CWE ID-CWE-295
Improper Certificate Validation
CVE-2023-28321
Matching Score-6
Assigner-HackerOne
ShareView Details
Matching Score-6
Assigner-HackerOne
CVSS Score-5.9||MEDIUM
EPSS-0.30% / 52.54%
||
7 Day CHG~0.00%
Published-26 May, 2023 | 00:00
Updated-15 Jan, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.

Action-Not Available
Vendor-n/aNetApp, Inc.Debian GNU/LinuxApple Inc.CURLFedora Project
Product-macosfedorah410s_firmwareh410scurlh500s_firmwaredebian_linuxh700s_firmwareontap_antivirus_connectorh500sh300s_firmwareclustered_data_ontaph700sh300shttps://github.com/curl/curl
CWE ID-CWE-295
Improper Certificate Validation
CVE-2025-5025
Matching Score-6
Assigner-curl
ShareView Details
Matching Score-6
Assigner-curl
CVSS Score-4.8||MEDIUM
EPSS-0.02% / 3.46%
||
7 Day CHG~0.00%
Published-28 May, 2025 | 06:29
Updated-30 Jul, 2025 | 19:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
No QUIC certificate pinning with wolfSSL

libcurl supports *pinning* of the server certificate public key for HTTPS transfers. Due to an omission, this check is not performed when connecting with QUIC for HTTP/3, when the TLS backend is wolfSSL. Documentation says the option works with wolfSSL, failing to specify that it does not for QUIC and HTTP/3. Since pinning makes the transfer succeed if the pin is fine, users could unwittingly connect to an impostor server without noticing.

Action-Not Available
Vendor-CURL
Product-curlcurl
CWE ID-CWE-295
Improper Certificate Validation
CVE-2024-0853
Matching Score-6
Assigner-curl
ShareView Details
Matching Score-6
Assigner-curl
CVSS Score-5.3||MEDIUM
EPSS-0.16% / 36.92%
||
7 Day CHG~0.00%
Published-03 Feb, 2024 | 13:35
Updated-20 Jun, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OCSP verification bypass with TLS session reuse

curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (*OCSP stapling*) test failed. A subsequent transfer to the same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check.

Action-Not Available
Vendor-CURL
Product-curlcurl
CWE ID-CWE-295
Improper Certificate Validation
CVE-2022-27782
Matching Score-6
Assigner-HackerOne
ShareView Details
Matching Score-6
Assigner-HackerOne
CVSS Score-7.5||HIGH
EPSS-0.28% / 51.17%
||
7 Day CHG-0.01%
Published-01 Jun, 2022 | 00:00
Updated-03 Aug, 2024 | 05:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup. However, several TLS andSSH settings were left out from the configuration match checks, making themmatch too easily.

Action-Not Available
Vendor-n/aDebian GNU/LinuxSplunk LLC (Cisco Systems, Inc.)CURL
Product-curluniversal_forwarderdebian_linuxhttps://github.com/curl/curl
CWE ID-CWE-840
Not Available
CWE ID-CWE-295
Improper Certificate Validation
CVE-2020-8286
Matching Score-6
Assigner-HackerOne
ShareView Details
Matching Score-6
Assigner-HackerOne
CVSS Score-7.5||HIGH
EPSS-0.22% / 44.48%
||
7 Day CHG~0.00%
Published-14 Dec, 2020 | 19:39
Updated-15 Nov, 2024 | 15:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response.

Action-Not Available
Vendor-n/aNetApp, Inc.Debian GNU/LinuxOracle CorporationSiemens AGSplunk LLC (Cisco Systems, Inc.)Apple Inc.CURLFedora Project
Product-libcurlpeoplesoft_enterprise_peopletoolscommunications_billing_and_revenue_managementhci_storage_nodehci_storage_node_firmwarehci_bootstrap_osmacosuniversal_forwarderhci_compute_nodecommunications_cloud_native_core_policysolidfiresinec_infrastructure_network_servicesclustered_data_ontapsimatic_tim_1531_irc_firmwaredebian_linuxessbasehci_management_nodefedoramac_os_xsimatic_tim_1531_irchttps://github.com/curl/curl
CWE ID-CWE-295
Improper Certificate Validation
CVE-2021-22926
Matching Score-6
Assigner-HackerOne
ShareView Details
Matching Score-6
Assigner-HackerOne
CVSS Score-7.5||HIGH
EPSS-0.77% / 72.49%
||
7 Day CHG~0.00%
Published-05 Aug, 2021 | 00:00
Updated-03 Aug, 2024 | 18:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

libcurl-using applications can ask for a specific client certificate to be used in a transfer. This is done with the `CURLOPT_SSLCERT` option (`--cert` with the command line tool).When libcurl is built to use the macOS native TLS library Secure Transport, an application can ask for the client certificate by name or with a file name - using the same option. If the name exists as a file, it will be used instead of by name.If the appliction runs with a current working directory that is writable by other users (like `/tmp`), a malicious user can create a file name with the same name as the app wants to use by name, and thereby trick the application to use the file based cert instead of the one referred to by name making libcurl send the wrong client certificate in the TLS connection handshake.

Action-Not Available
Vendor-n/aNetApp, Inc.Oracle CorporationSplunk LLC (Cisco Systems, Inc.)CURLSiemens AG
Product-h300epeoplesoft_enterprise_peopletoolsh500sh300s_firmwareactive_iq_unified_managerh410soncommand_workflow_automationcurlh300suniversal_forwardersolidfiresnapcentersinec_infrastructure_network_servicesh300e_firmwareclustered_data_ontaph500ehci_management_nodeh410s_firmwareh700s_firmwareh500s_firmwareh500e_firmwareh700eh700e_firmwaremysql_serverh700soncommand_insighthttps://github.com/curl/curl
CWE ID-CWE-840
Not Available
CWE ID-CWE-295
Improper Certificate Validation
CVE-2016-9952
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-1.06% / 76.73%
||
7 Day CHG~0.00%
Published-12 Mar, 2018 | 21:00
Updated-07 Aug, 2024 | 19:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The verify_certificate function in lib/vtls/schannel.c in libcurl 7.30.0 through 7.51.0, when built for Windows CE using the schannel TLS backend, makes it easier for remote attackers to conduct man-in-the-middle attacks via a crafted wildcard SAN in a server certificate, as demonstrated by "*.com."

Action-Not Available
Vendor-n/aMicrosoft CorporationCURL
Product-curlwindows_embedded_compactn/acurl
CWE ID-CWE-295
Improper Certificate Validation
CVE-2020-28942
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.10% / 27.63%
||
7 Day CHG~0.00%
Published-19 Nov, 2020 | 16:38
Updated-04 Aug, 2024 | 16:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue exists in PrimeKey EJBCA before 7.4.3 when enrolling with EST while proxied through an RA over the Peers protocol. As a part of EJBCA's domain security model, the peer connector allows the restriction of client certificates (for the RA, not the end user) to a limited set of allowed CAs, thus restricting the accessibility of that RA to the rights it has within a specific role. While this works for other protocols such as CMP, it was found that the EJBCA enrollment over an EST implementation bypasses this check, allowing enrollment with a valid client certificate through any functioning and authenticated RA connected to the CA. NOTE: an attacker must already have a trusted client certificate and authorization to enroll against the targeted CA.

Action-Not Available
Vendor-primekeyn/a
Product-ejbcan/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2020-12144
Matching Score-4
Assigner-Silver Peak Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Silver Peak Systems, Inc.
CVSS Score-6||MEDIUM
EPSS-0.07% / 23.11%
||
7 Day CHG~0.00%
Published-05 May, 2020 | 19:54
Updated-04 Aug, 2024 | 11:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
The certificate used to identify the Silver Peak Cloud Portal to EdgeConnect devices is not validated

The certificate used to identify the Silver Peak Cloud Portal to EdgeConnect devices is not validated. This makes it possible for someone to establish a TLS connection from EdgeConnect to an untrusted portal.

Action-Not Available
Vendor-silver-peakSilver Peak Systems, Inc.Aruba Networks
Product-nx-8000_firmwarenx-10k_firmwarenx-2000_firmwarenx-1000vx-9000_firmwarenx-11k_firmwarenx-700_firmwarenx-7000vx-7000_firmwareunity_edgeconnect_for_azurevx-8000vx-5000_firmwarenx-6000nx-3000_firmwarevx-500unity_edgeconnect_for_amazon_web_servicesvx-9000nx-700nx-3000unity_edgeconnect_for_google_cloud_platformnx-10knx-1000_firmwarenx-5000_firmwarevx-6000vx-500_firmwarevx-7000vx-5000vx-3000nx-7000_firmwarenx-9000nx-5000vx-6000_firmwarenx-2000vx-2000_firmwarenx-9000_firmwarevx-1000vx-2000nx-8000nx-6000_firmwarevx-1000_firmwarevx-8000_firmwarenx-11kvx-3000_firmwareunity_orchestrator1. Unity EdgeConnect, NX, VX 2. Unity Orchestrator  3. EdgeConnect in AWS, Azure, GCP 
CWE ID-CWE-295
Improper Certificate Validation
CVE-2021-22218
Matching Score-4
Assigner-GitLab Inc.
ShareView Details
Matching Score-4
Assigner-GitLab Inc.
CVSS Score-2.6||LOW
EPSS-0.12% / 32.40%
||
7 Day CHG~0.00%
Published-08 Jun, 2021 | 15:04
Updated-03 Aug, 2024 | 18:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

All versions of GitLab CE/EE starting from 12.8 before 13.10.5, all versions starting from 13.11 before 13.11.5, and all versions starting from 13.12 before 13.12.2 were affected by an issue in the handling of x509 certificates that could be used to spoof author of signed commits.

Action-Not Available
Vendor-GitLab Inc.
Product-gitlabGitLab
CWE ID-CWE-295
Improper Certificate Validation
CVE-2017-7562
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.26% / 48.77%
||
7 Day CHG~0.00%
Published-26 Jul, 2018 | 15:00
Updated-05 Aug, 2024 | 16:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An authentication bypass flaw was found in the way krb5's certauth interface before 1.16.1 handled the validation of client certificates. A remote attacker able to communicate with the KDC could potentially use this flaw to impersonate arbitrary principals under rare and erroneous circumstances.

Action-Not Available
Vendor-MIT (Massachusetts Institute of Technology)Red Hat, Inc.
Product-enterprise_linux_serverenterprise_linux_workstationenterprise_linuxkerberos_5enterprise_linux_desktopkrb5
CWE ID-CWE-295
Improper Certificate Validation
CWE ID-CWE-287
Improper Authentication
CVE-2022-21657
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.04% / 10.58%
||
7 Day CHG~0.00%
Published-22 Feb, 2022 | 22:30
Updated-23 Apr, 2025 | 19:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
X.509 Extended Key Usage and Trust Purposes bypass in Envoy

Envoy is an open source edge and service proxy, designed for cloud-native applications. In affected versions Envoy does not restrict the set of certificates it accepts from the peer, either as a TLS client or a TLS server, to only those certificates that contain the necessary extendedKeyUsage (id-kp-serverAuth and id-kp-clientAuth, respectively). This means that a peer may present an e-mail certificate (e.g. id-kp-emailProtection), either as a leaf certificate or as a CA in the chain, and it will be accepted for TLS. This is particularly bad when combined with the issue described in pull request #630, in that it allows a Web PKI CA that is intended only for use with S/MIME, and thus exempted from audit or supervision, to issue TLS certificates that will be accepted by Envoy. As a result Envoy will trust upstream certificates that should not be trusted. There are no known workarounds to this issue. Users are advised to upgrade.

Action-Not Available
Vendor-envoyproxyenvoyproxy
Product-envoyenvoy
CWE ID-CWE-295
Improper Certificate Validation
CVE-2017-18918
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-4.9||MEDIUM
EPSS-0.10% / 27.94%
||
7 Day CHG~0.00%
Published-19 Jun, 2020 | 19:19
Updated-05 Aug, 2024 | 21:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Mattermost Server before 3.7.3 and 3.6.5. A System Administrator can place a SAML certificate at an arbitrary pathname.

Action-Not Available
Vendor-n/aMattermost, Inc.
Product-mattermost_servern/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2020-12143
Matching Score-4
Assigner-Silver Peak Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Silver Peak Systems, Inc.
CVSS Score-6||MEDIUM
EPSS-0.09% / 25.81%
||
7 Day CHG~0.00%
Published-05 May, 2020 | 19:53
Updated-04 Aug, 2024 | 11:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
The certificate used to identify Orchestrator to EdgeConnect devices is not validated

The certificate used to identify Orchestrator to EdgeConnect devices is not validated, which makes it possible for someone to establish a TLS connection from EdgeConnect to an untrusted Orchestrator.

Action-Not Available
Vendor-silver-peakSilver Peak Systems, Inc.Aruba Networks
Product-nx-8000_firmwarenx-10k_firmwarenx-2000_firmwarenx-1000vx-9000_firmwarenx-11k_firmwarenx-700_firmwarenx-7000vx-7000_firmwareunity_edgeconnect_for_azurevx-8000vx-5000_firmwarenx-6000nx-3000_firmwarevx-500unity_edgeconnect_for_amazon_web_servicesvx-9000nx-700nx-3000unity_edgeconnect_for_google_cloud_platformnx-10knx-1000_firmwarenx-5000_firmwarevx-6000vx-500_firmwarevx-7000vx-5000vx-3000nx-7000_firmwarenx-9000nx-5000vx-6000_firmwarenx-2000vx-2000_firmwarenx-9000_firmwarevx-1000vx-2000nx-8000nx-6000_firmwarevx-1000_firmwarevx-8000_firmwarenx-11kvx-3000_firmwareunity_orchestrator1. Unity EdgeConnect, NX, VX 2. Unity Orchestrator,   3. EdgeConnect in AWS, Azure, GCP 
CWE ID-CWE-295
Improper Certificate Validation
CVE-2020-10659
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.12% / 32.27%
||
7 Day CHG~0.00%
Published-18 Mar, 2020 | 01:40
Updated-04 Aug, 2024 | 11:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Entrust Entelligence Security Provider (ESP) before 10.0.60 on Windows mishandles errors during SSL Certificate Validation, leading to situations where (for example) a user continues to interact with a web site that has an invalid certificate chain.

Action-Not Available
Vendor-entrustdatacardn/aMicrosoft Corporation
Product-windowsentelligence_security_providern/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2021-32755
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.10% / 28.97%
||
7 Day CHG~0.00%
Published-13 Jul, 2021 | 20:55
Updated-03 Aug, 2024 | 23:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Certificate pinning is not enforced on the web socket connection

Wire is a collaboration platform. wire-ios-transport handles authentication of requests, network failures, and retries for the iOS implementation of Wire. In the 3.82 version of the iOS application, a new web socket implementation was introduced for users running iOS 13 or higher. This new websocket implementation is not configured to enforce certificate pinning when available. Certificate pinning for the new websocket is enforced in version 3.84 or above.

Action-Not Available
Vendor-wirewireappApple Inc.
Product-iphone_oswirewire-ios-transport
CWE ID-CWE-295
Improper Certificate Validation
Details not found