Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2026-4873

Summary
Assigner-curl
Assigner Org ID-2499f714-1537-4658-8207-48ae4bb9eae9
Published At-13 May, 2026 | 08:27
Updated At-13 May, 2026 | 19:30
Rejected At-
Credits

connection reuse ignores TLS requirement

A vulnerability exists where a connection requiring TLS incorrectly reuses an existing unencrypted connection from the same connection pool. If an initial transfer is made in clear-text (via IMAP, SMTP, or POP3), a subsequent request to that same host bypasses the TLS requirement and instead transmit data unencrypted.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:curl
Assigner Org ID:2499f714-1537-4658-8207-48ae4bb9eae9
Published At:13 May, 2026 | 08:27
Updated At:13 May, 2026 | 19:30
Rejected At:
â–¼CVE Numbering Authority (CNA)
connection reuse ignores TLS requirement

A vulnerability exists where a connection requiring TLS incorrectly reuses an existing unencrypted connection from the same connection pool. If an initial transfer is made in clear-text (via IMAP, SMTP, or POP3), a subsequent request to that same host bypasses the TLS requirement and instead transmit data unencrypted.

Affected Products
Vendor
CURLcurl
Product
curl
Default Status
unaffected
Versions
Affected
  • From 8.19.0 through 8.19.0 (semver)
  • From 8.18.0 through 8.18.0 (semver)
  • From 8.17.0 through 8.17.0 (semver)
  • From 8.16.0 through 8.16.0 (semver)
  • From 8.15.0 through 8.15.0 (semver)
  • From 8.14.1 through 8.14.1 (semver)
  • From 8.14.0 through 8.14.0 (semver)
  • From 8.13.0 through 8.13.0 (semver)
  • From 8.12.1 through 8.12.1 (semver)
  • From 8.12.0 through 8.12.0 (semver)
  • From 8.11.1 through 8.11.1 (semver)
  • From 8.11.0 through 8.11.0 (semver)
  • From 8.10.1 through 8.10.1 (semver)
  • From 8.10.0 through 8.10.0 (semver)
  • From 8.9.1 through 8.9.1 (semver)
  • From 8.9.0 through 8.9.0 (semver)
  • From 8.8.0 through 8.8.0 (semver)
  • From 8.7.1 through 8.7.1 (semver)
  • From 8.7.0 through 8.7.0 (semver)
  • From 8.6.0 through 8.6.0 (semver)
  • From 8.5.0 through 8.5.0 (semver)
  • From 8.4.0 through 8.4.0 (semver)
  • From 8.3.0 through 8.3.0 (semver)
  • From 8.2.1 through 8.2.1 (semver)
  • From 8.2.0 through 8.2.0 (semver)
  • From 8.1.2 through 8.1.2 (semver)
  • From 8.1.1 through 8.1.1 (semver)
  • From 8.1.0 through 8.1.0 (semver)
  • From 8.0.1 through 8.0.1 (semver)
  • From 8.0.0 through 8.0.0 (semver)
  • From 7.88.1 through 7.88.1 (semver)
  • From 7.88.0 through 7.88.0 (semver)
  • From 7.87.0 through 7.87.0 (semver)
  • From 7.86.0 through 7.86.0 (semver)
  • From 7.85.0 through 7.85.0 (semver)
  • From 7.84.0 through 7.84.0 (semver)
  • From 7.83.1 through 7.83.1 (semver)
  • From 7.83.0 through 7.83.0 (semver)
  • From 7.82.0 through 7.82.0 (semver)
  • From 7.81.0 through 7.81.0 (semver)
  • From 7.80.0 through 7.80.0 (semver)
  • From 7.79.1 through 7.79.1 (semver)
  • From 7.79.0 through 7.79.0 (semver)
  • From 7.78.0 through 7.78.0 (semver)
  • From 7.77.0 through 7.77.0 (semver)
  • From 7.76.1 through 7.76.1 (semver)
  • From 7.76.0 through 7.76.0 (semver)
  • From 7.75.0 through 7.75.0 (semver)
  • From 7.74.0 through 7.74.0 (semver)
  • From 7.73.0 through 7.73.0 (semver)
  • From 7.72.0 through 7.72.0 (semver)
  • From 7.71.1 through 7.71.1 (semver)
  • From 7.71.0 through 7.71.0 (semver)
  • From 7.70.0 through 7.70.0 (semver)
  • From 7.69.1 through 7.69.1 (semver)
  • From 7.69.0 through 7.69.0 (semver)
  • From 7.68.0 through 7.68.0 (semver)
  • From 7.67.0 through 7.67.0 (semver)
  • From 7.66.0 through 7.66.0 (semver)
  • From 7.65.3 through 7.65.3 (semver)
  • From 7.65.2 through 7.65.2 (semver)
  • From 7.65.1 through 7.65.1 (semver)
  • From 7.65.0 through 7.65.0 (semver)
  • From 7.64.1 through 7.64.1 (semver)
  • From 7.64.0 through 7.64.0 (semver)
  • From 7.63.0 through 7.63.0 (semver)
  • From 7.62.0 through 7.62.0 (semver)
  • From 7.61.1 through 7.61.1 (semver)
  • From 7.61.0 through 7.61.0 (semver)
  • From 7.60.0 through 7.60.0 (semver)
  • From 7.59.0 through 7.59.0 (semver)
  • From 7.58.0 through 7.58.0 (semver)
  • From 7.57.0 through 7.57.0 (semver)
  • From 7.56.1 through 7.56.1 (semver)
  • From 7.56.0 through 7.56.0 (semver)
  • From 7.55.1 through 7.55.1 (semver)
  • From 7.55.0 through 7.55.0 (semver)
  • From 7.54.1 through 7.54.1 (semver)
  • From 7.54.0 through 7.54.0 (semver)
  • From 7.53.1 through 7.53.1 (semver)
  • From 7.53.0 through 7.53.0 (semver)
  • From 7.52.1 through 7.52.1 (semver)
  • From 7.52.0 through 7.52.0 (semver)
  • From 7.51.0 through 7.51.0 (semver)
  • From 7.50.3 through 7.50.3 (semver)
  • From 7.50.2 through 7.50.2 (semver)
  • From 7.50.1 through 7.50.1 (semver)
  • From 7.50.0 through 7.50.0 (semver)
  • From 7.49.1 through 7.49.1 (semver)
  • From 7.49.0 through 7.49.0 (semver)
  • From 7.48.0 through 7.48.0 (semver)
  • From 7.47.1 through 7.47.1 (semver)
  • From 7.47.0 through 7.47.0 (semver)
  • From 7.46.0 through 7.46.0 (semver)
  • From 7.45.0 through 7.45.0 (semver)
  • From 7.44.0 through 7.44.0 (semver)
  • From 7.43.0 through 7.43.0 (semver)
  • From 7.42.1 through 7.42.1 (semver)
  • From 7.42.0 through 7.42.0 (semver)
  • From 7.41.0 through 7.41.0 (semver)
  • From 7.40.0 through 7.40.0 (semver)
  • From 7.39.0 through 7.39.0 (semver)
  • From 7.38.0 through 7.38.0 (semver)
  • From 7.37.1 through 7.37.1 (semver)
  • From 7.37.0 through 7.37.0 (semver)
  • From 7.36.0 through 7.36.0 (semver)
  • From 7.35.0 through 7.35.0 (semver)
  • From 7.34.0 through 7.34.0 (semver)
  • From 7.33.0 through 7.33.0 (semver)
  • From 7.32.0 through 7.32.0 (semver)
  • From 7.31.0 through 7.31.0 (semver)
  • From 7.30.0 through 7.30.0 (semver)
  • From 7.29.0 through 7.29.0 (semver)
  • From 7.28.1 through 7.28.1 (semver)
  • From 7.28.0 through 7.28.0 (semver)
  • From 7.27.0 through 7.27.0 (semver)
  • From 7.26.0 through 7.26.0 (semver)
  • From 7.25.0 through 7.25.0 (semver)
  • From 7.24.0 through 7.24.0 (semver)
  • From 7.23.1 through 7.23.1 (semver)
  • From 7.23.0 through 7.23.0 (semver)
  • From 7.22.0 through 7.22.0 (semver)
  • From 7.21.7 through 7.21.7 (semver)
  • From 7.21.6 through 7.21.6 (semver)
  • From 7.21.5 through 7.21.5 (semver)
  • From 7.21.4 through 7.21.4 (semver)
  • From 7.21.3 through 7.21.3 (semver)
  • From 7.21.2 through 7.21.2 (semver)
  • From 7.21.1 through 7.21.1 (semver)
  • From 7.21.0 through 7.21.0 (semver)
  • From 7.20.1 through 7.20.1 (semver)
  • From 7.20.0 through 7.20.0 (semver)
Problem Types
TypeCWE IDDescription
N/AN/ACWE-319 Cleartext Transmission of Sensitive Information
Type: N/A
CWE ID: N/A
Description: CWE-319 Cleartext Transmission of Sensitive Information
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

finder
Arkadi Vainbrand
remediation developer
Daniel Stenberg
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://curl.se/docs/CVE-2026-4873.json
N/A
https://curl.se/docs/CVE-2026-4873.html
N/A
https://hackerone.com/reports/3621851
N/A
Hyperlink: https://curl.se/docs/CVE-2026-4873.json
Resource: N/A
Hyperlink: https://curl.se/docs/CVE-2026-4873.html
Resource: N/A
Hyperlink: https://hackerone.com/reports/3621851
Resource: N/A
â–¼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.openwall.com/lists/oss-security/2026/04/29/7
N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2026/04/29/7
Resource: N/A
2. CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-319CWE-319 Cleartext Transmission of Sensitive Information
Type: CWE
CWE ID: CWE-319
Description: CWE-319 Cleartext Transmission of Sensitive Information
Metrics
VersionBase scoreBase severityVector
3.15.9MEDIUM
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Version: 3.1
Base score: 5.9
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:2499f714-1537-4658-8207-48ae4bb9eae9
Published At:13 May, 2026 | 13:01
Updated At:14 May, 2026 | 13:45

A vulnerability exists where a connection requiring TLS incorrectly reuses an existing unencrypted connection from the same connection pool. If an initial transfer is made in clear-text (via IMAP, SMTP, or POP3), a subsequent request to that same host bypasses the TLS requirement and instead transmit data unencrypted.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.15.9MEDIUM
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 5.9
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CPE Matches

CURL
haxx
>>curl>>Versions from 7.20.0(inclusive) to 8.20.0(exclusive)
cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-295Primarynvd@nist.gov
CWE-319Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-295
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-319
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://curl.se/docs/CVE-2026-4873.html2499f714-1537-4658-8207-48ae4bb9eae9
Patch
Vendor Advisory
https://curl.se/docs/CVE-2026-4873.json2499f714-1537-4658-8207-48ae4bb9eae9
Vendor Advisory
https://hackerone.com/reports/36218512499f714-1537-4658-8207-48ae4bb9eae9
Exploit
Issue Tracking
Third Party Advisory
http://www.openwall.com/lists/oss-security/2026/04/29/7af854a3a-2127-422b-91ae-364da2661108
Mailing List
Patch
Third Party Advisory
Hyperlink: https://curl.se/docs/CVE-2026-4873.html
Source: 2499f714-1537-4658-8207-48ae4bb9eae9
Resource:
Patch
Vendor Advisory
Hyperlink: https://curl.se/docs/CVE-2026-4873.json
Source: 2499f714-1537-4658-8207-48ae4bb9eae9
Resource:
Vendor Advisory
Hyperlink: https://hackerone.com/reports/3621851
Source: 2499f714-1537-4658-8207-48ae4bb9eae9
Resource:
Exploit
Issue Tracking
Third Party Advisory
Hyperlink: http://www.openwall.com/lists/oss-security/2026/04/29/7
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Patch
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

225Records found

CVE-2024-32928
Matching Score-10
Assigner-Google Devices
ShareView Details
Matching Score-10
Assigner-Google Devices
CVSS Score-5.9||MEDIUM
EPSS-0.12% / 31.21%
||
7 Day CHG~0.00%
Published-19 Aug, 2024 | 16:38
Updated-14 Mar, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The libcurl CURLOPT_SSL_VERIFYPEER option was disabled on a subset of requests made by Nest production devices which enabled a potential man-in-the-middle attack on requests to Google cloud services by any host the traffic was routed through.

Action-Not Available
Vendor-CURLGoogle LLC
Product-nest_mininest_mini_firmwarelibcurlNest Speakers
CWE ID-CWE-295
Improper Certificate Validation
CVE-2022-32208
Matching Score-8
Assigner-HackerOne
ShareView Details
Matching Score-8
Assigner-HackerOne
CVSS Score-5.9||MEDIUM
EPSS-0.16% / 36.54%
||
7 Day CHG+0.02%
Published-07 Jul, 2022 | 00:00
Updated-05 May, 2025 | 17:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

When curl < 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.

Action-Not Available
Vendor-n/aCURLSplunk LLC (Cisco Systems, Inc.)Apple Inc.NetApp, Inc.Debian GNU/LinuxFedora Project
Product-h410smacosdebian_linuxh500s_firmwarehci_compute_nodeh700s_firmwarefedoracurlsolidfirebootstrap_osh410s_firmwareh700suniversal_forwarderh500sh300s_firmwareelement_softwareclustered_data_ontaph300shci_management_nodehttps://github.com/curl/curl
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-27536
Matching Score-8
Assigner-HackerOne
ShareView Details
Matching Score-8
Assigner-HackerOne
CVSS Score-5.9||MEDIUM
EPSS-0.01% / 1.36%
||
7 Day CHG~0.00%
Published-30 Mar, 2023 | 00:00
Updated-14 Feb, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.

Action-Not Available
Vendor-n/aCURLFedora ProjectSplunk LLC (Cisco Systems, Inc.)Debian GNU/LinuxNetApp, Inc.
Product-h700sh500sontapdebian_linuxlibcurlh300sh500s_firmwareuniversal_forwarderh300s_firmwareh410s_firmwareactive_iq_unified_managerfedorah700s_firmwareh410shttps://github.com/curl/curl
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-305
Authentication Bypass by Primary Weakness
CVE-2023-27535
Matching Score-8
Assigner-HackerOne
ShareView Details
Matching Score-8
Assigner-HackerOne
CVSS Score-5.9||MEDIUM
EPSS-0.04% / 10.93%
||
7 Day CHG~0.00%
Published-30 Mar, 2023 | 00:00
Updated-09 Jun, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An authentication bypass vulnerability exists in libcurl <8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.

Action-Not Available
Vendor-n/aNetApp, Inc.Fedora ProjectDebian GNU/LinuxSplunk LLC (Cisco Systems, Inc.)CURL
Product-debian_linuxh700sh300sontap_9h410s_firmwareuniversal_forwarderfedorah300s_firmwareh700s_firmwareh500sh500s_firmwarelibcurlactive_iq_unified_managerh410shttps://github.com/curl/curl
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-305
Authentication Bypass by Primary Weakness
CVE-2026-7009
Matching Score-6
Assigner-curl
ShareView Details
Matching Score-6
Assigner-curl
CVSS Score-5.3||MEDIUM
EPSS-0.02% / 4.03%
||
7 Day CHG~0.00%
Published-13 May, 2026 | 08:28
Updated-14 May, 2026 | 14:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OCSP stapling bypass with Apple SecTrust

When curl is told to use the Certificate Status Request TLS extension, often referred to as *OCSP stapling*, to verify that the server certificate is valid, it fails to detect OCSP problems and instead wrongly consider the response as fine.

Action-Not Available
Vendor-CURL
Product-curlcurl
CWE ID-CWE-295
Improper Certificate Validation
CVE-2026-6276
Matching Score-6
Assigner-curl
ShareView Details
Matching Score-6
Assigner-curl
CVSS Score-7.5||HIGH
EPSS-0.02% / 4.40%
||
7 Day CHG~0.00%
Published-13 May, 2026 | 08:28
Updated-14 May, 2026 | 14:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
stale custom cookie host causes cookie leak

Using libcurl, when a custom `Host:` header is first set for an HTTP request and a second request is subsequently done using the same *easy handle* but without the custom `Host:` header set, the second request would use stale information and pass on cookies meant for the first host in the second request. Leak them.

Action-Not Available
Vendor-CURL
Product-curlcurl
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2017-2629
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.58% / 69.22%
||
7 Day CHG~0.00%
Published-27 Jul, 2018 | 19:00
Updated-05 Aug, 2024 | 14:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

curl before 7.53.0 has an incorrect TLS Certificate Status Request extension feature that asks for a fresh proof of the server's certificate's validity in the code that checks for a test success or failure. It ends up always thinking there's valid proof, even when there is none or if the server doesn't support the TLS extension in question. This could lead to users not detecting when a server's certificate goes invalid or otherwise be mislead that the server is in a better shape than it is in reality. This flaw also exists in the command line tool (--cert-status).

Action-Not Available
Vendor-CURL
Product-curlcurl
CWE ID-CWE-295
Improper Certificate Validation
CVE-2022-43551
Matching Score-6
Assigner-HackerOne
ShareView Details
Matching Score-6
Assigner-HackerOne
CVSS Score-7.5||HIGH
EPSS-0.05% / 15.27%
||
7 Day CHG~0.00%
Published-23 Dec, 2022 | 00:00
Updated-13 Feb, 2026 | 20:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability exists in curl <7.87.0 HSTS check that could be bypassed to trick it to keep using HTTP. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. However, the HSTS mechanism could be bypassed if the host name in the given URL first uses IDN characters that get replaced to ASCII counterparts as part of the IDN conversion. Like using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop (U+002E) `.`. Then in a subsequent request, it does not detect the HSTS state and makes a clear text transfer. Because it would store the info IDN encoded but look for it IDN decoded.

Action-Not Available
Vendor-n/aCURLSplunk LLC (Cisco Systems, Inc.)NetApp, Inc.Fedora Project
Product-active_iq_unified_manageroncommand_insightuniversal_forwardersnapcentercurloncommand_workflow_automationfedorahttps://github.com/curl/curl
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2022-42916
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.05% / 14.83%
||
7 Day CHG~0.00%
Published-29 Oct, 2022 | 00:00
Updated-13 Feb, 2026 | 20:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In curl before 7.86.0, the HSTS check could be bypassed to trick it into staying with HTTP. Using its HSTS support, curl can be instructed to use HTTPS directly (instead of using an insecure cleartext HTTP step) even when HTTP is provided in the URL. This mechanism could be bypassed if the host name in the given URL uses IDN characters that get replaced with ASCII counterparts as part of the IDN conversion, e.g., using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop of U+002E (.). The earliest affected version is 7.77.0 2021-05-26.

Action-Not Available
Vendor-n/aCURLFedora ProjectApple Inc.Splunk LLC (Cisco Systems, Inc.)
Product-curlfedoramacosuniversal_forwardern/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2025-14819
Matching Score-6
Assigner-curl
ShareView Details
Matching Score-6
Assigner-curl
CVSS Score-5.3||MEDIUM
EPSS-0.06% / 18.95%
||
7 Day CHG+0.02%
Published-08 Jan, 2026 | 10:07
Updated-20 Jan, 2026 | 14:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OpenSSL partial chain store policy bypass

When doing TLS related transfers with reused easy or multi handles and altering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally reuse a CA store cached in memory for which the partial chain option was reversed. Contrary to the user's wishes and expectations. This could make libcurl find and accept a trust chain that it otherwise would not.

Action-Not Available
Vendor-CURL
Product-curlcurl
CWE ID-CWE-295
Improper Certificate Validation
CVE-2022-30115
Matching Score-6
Assigner-HackerOne
ShareView Details
Matching Score-6
Assigner-HackerOne
CVSS Score-4.3||MEDIUM
EPSS-0.09% / 25.12%
||
7 Day CHG~0.00%
Published-01 Jun, 2022 | 00:00
Updated-03 Aug, 2024 | 06:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Using its HSTS support, curl can be instructed to use HTTPS directly insteadof using an insecure clear-text HTTP step even when HTTP is provided in theURL. This mechanism could be bypassed if the host name in the given URL used atrailing dot while not using one when it built the HSTS cache. Or the otherway around - by having the trailing dot in the HSTS cache and *not* using thetrailing dot in the URL.

Action-Not Available
Vendor-n/aNetApp, Inc.Splunk LLC (Cisco Systems, Inc.)CURL
Product-clustered_data_ontapuniversal_forwarderh500ssolidfire_\&_hci_management_nodeh410s_firmwareh700s_firmwareh300s_firmwareh500s_firmwarehci_bootstrap_osh410ssolidfire\,_enterprise_sds_\&_hci_storage_nodeh700scurlhci_compute_nodeh300shttps://github.com/curl/curl
CWE ID-CWE-325
Missing Cryptographic Step
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2022-27782
Matching Score-6
Assigner-HackerOne
ShareView Details
Matching Score-6
Assigner-HackerOne
CVSS Score-7.5||HIGH
EPSS-0.47% / 64.70%
||
7 Day CHG~0.00%
Published-01 Jun, 2022 | 00:00
Updated-16 Apr, 2026 | 15:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup. However, several TLS andSSH settings were left out from the configuration match checks, making themmatch too easily.

Action-Not Available
Vendor-n/aDebian GNU/LinuxSplunk LLC (Cisco Systems, Inc.)CURL
Product-debian_linuxuniversal_forwardercurlhttps://github.com/curl/curl
CWE ID-CWE-295
Improper Certificate Validation
CVE-2024-8096
Matching Score-6
Assigner-curl
ShareView Details
Matching Score-6
Assigner-curl
CVSS Score-6.5||MEDIUM
EPSS-0.52% / 66.80%
||
7 Day CHG~0.00%
Published-11 Sep, 2024 | 10:03
Updated-30 Jul, 2025 | 19:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OCSP stapling bypass with GnuTLS

When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems and instead wrongly consider the response as fine. If the returned status reports another error than 'revoked' (like for example 'unauthorized') it is not treated as a bad certficate.

Action-Not Available
Vendor-Debian GNU/LinuxCURLNetApp, Inc.
Product-bootstrap_osh410sh300s_firmwarecurlh500sontap_select_deploy_administration_utilityh410s_firmwareh300sh700sactive_iq_unified_managerontap_toolsdebian_linuxh700s_firmwareh500s_firmwarehci_compute_nodecurlcurl
CWE ID-CWE-295
Improper Certificate Validation
CVE-2021-22923
Matching Score-6
Assigner-HackerOne
ShareView Details
Matching Score-6
Assigner-HackerOne
CVSS Score-5.3||MEDIUM
EPSS-0.07% / 20.76%
||
7 Day CHG~0.00%
Published-05 Aug, 2021 | 00:00
Updated-19 Nov, 2024 | 14:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

When curl is instructed to get content using the metalink feature, and a user name and password are used to download the metalink XML file, those same credentials are then subsequently passed on to each of the servers from which curl will download or try to download the contents from. Often contrary to the user's expectations and intentions and without telling the user it happened.

Action-Not Available
Vendor-n/aNetApp, Inc.Oracle CorporationSiemens AGSplunk LLC (Cisco Systems, Inc.)CURLFedora Project
Product-h300eh500scloud_backuph300s_firmwareh410scurlh300suniversal_forwardersolidfiresinec_infrastructure_network_servicesh300e_firmwareclustered_data_ontaph500ehci_management_nodeh410s_firmwarefedorah500s_firmwareh500e_firmwareh700s_firmwareh700eh700e_firmwareh700smysql_serverhttps://github.com/curl/curl
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2024-2379
Matching Score-6
Assigner-curl
ShareView Details
Matching Score-6
Assigner-curl
CVSS Score-6.3||MEDIUM
EPSS-0.21% / 42.49%
||
7 Day CHG~0.00%
Published-27 Mar, 2024 | 07:56
Updated-30 Jul, 2025 | 19:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
QUIC certificate check bypass with wolfSSL

libcurl skips the certificate verification for a QUIC connection under certain conditions, when built to use wolfSSL. If told to use an unknown/bad cipher or curve, the error path accidentally skips the verification and returns OK, thus ignoring any certificate problems.

Action-Not Available
Vendor-Apple Inc.CURLNetApp, Inc.
Product-hci_compute_nodeh610ch300s_firmwaremacosh300sactive_iq_unified_managerh410s_firmwareh500s_firmwareh700sh410sbootstrap_osh700s_firmwarecurlh610sh610c_firmwareh500sontap_select_deploy_administration_utilityh610s_firmwareh615c_firmwareh615ccurl
CWE ID-CWE-295
Improper Certificate Validation
CVE-2021-22946
Matching Score-6
Assigner-HackerOne
ShareView Details
Matching Score-6
Assigner-HackerOne
CVSS Score-7.5||HIGH
EPSS-0.06% / 19.49%
||
7 Day CHG~0.00%
Published-29 Sep, 2021 | 00:00
Updated-16 Apr, 2026 | 15:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A user can tell curl >= 7.20.0 and <= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server (`--ssl-reqd` on the command line or`CURLOPT_USE_SSL` set to `CURLUSESSL_CONTROL` or `CURLUSESSL_ALL` withlibcurl). This requirement could be bypassed if the server would return a properly crafted but perfectly legitimate response.This flaw would then make curl silently continue its operations **withoutTLS** contrary to the instructions and expectations, exposing possibly sensitive data in clear text over the network.

Action-Not Available
Vendor-n/aOracle CorporationApple Inc.Debian GNU/LinuxSplunk LLC (Cisco Systems, Inc.)NetApp, Inc.Fedora ProjectSiemens AGCURL
Product-h300ecurlh410s_firmwareh500scommunications_cloud_native_core_security_edge_protection_proxycommunications_cloud_native_core_consoledebian_linuxpeoplesoft_enterprise_peopletoolsuniversal_forwarderh300s_firmwareoncommand_insightmysql_serverh700e_firmwaremacosh500s_firmwareh410scommunications_cloud_native_core_service_communication_proxyh700s_firmwareh300e_firmwareh500eclustered_data_ontaponcommand_workflow_automationh700eh700scommunications_cloud_native_core_binding_support_functioncommunications_cloud_native_core_network_repository_functionh300sh500e_firmwaresolidfire_baseboard_management_controller_firmwarecommerce_guided_searchcommunications_cloud_native_core_network_slice_selection_functionsinec_infrastructure_network_servicescommunications_cloud_native_core_network_function_cloud_native_environmentsnapcentercloud_backupfedorasolidfire_baseboard_management_controllerhttps://github.com/curl/curl
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CWE ID-CWE-325
Missing Cryptographic Step
CVE-2021-22926
Matching Score-6
Assigner-HackerOne
ShareView Details
Matching Score-6
Assigner-HackerOne
CVSS Score-7.5||HIGH
EPSS-0.66% / 71.23%
||
7 Day CHG~0.00%
Published-05 Aug, 2021 | 00:00
Updated-03 Aug, 2024 | 18:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

libcurl-using applications can ask for a specific client certificate to be used in a transfer. This is done with the `CURLOPT_SSLCERT` option (`--cert` with the command line tool).When libcurl is built to use the macOS native TLS library Secure Transport, an application can ask for the client certificate by name or with a file name - using the same option. If the name exists as a file, it will be used instead of by name.If the appliction runs with a current working directory that is writable by other users (like `/tmp`), a malicious user can create a file name with the same name as the app wants to use by name, and thereby trick the application to use the file based cert instead of the one referred to by name making libcurl send the wrong client certificate in the TLS connection handshake.

Action-Not Available
Vendor-n/aNetApp, Inc.Oracle CorporationSplunk LLC (Cisco Systems, Inc.)CURLSiemens AG
Product-h300epeoplesoft_enterprise_peopletoolsh500sh300s_firmwareactive_iq_unified_managerh410soncommand_workflow_automationcurlh300suniversal_forwardersolidfiresnapcentersinec_infrastructure_network_servicesh300e_firmwareclustered_data_ontaph500ehci_management_nodeh410s_firmwareh700s_firmwareh500s_firmwareh500e_firmwareh700eh700e_firmwaremysql_serverh700soncommand_insighthttps://github.com/curl/curl
CWE ID-CWE-840
Not Available
CWE ID-CWE-295
Improper Certificate Validation
CVE-2020-8286
Matching Score-6
Assigner-HackerOne
ShareView Details
Matching Score-6
Assigner-HackerOne
CVSS Score-7.5||HIGH
EPSS-0.29% / 52.16%
||
7 Day CHG~0.00%
Published-14 Dec, 2020 | 19:39
Updated-15 Nov, 2024 | 15:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response.

Action-Not Available
Vendor-n/aNetApp, Inc.Debian GNU/LinuxOracle CorporationSiemens AGSplunk LLC (Cisco Systems, Inc.)Apple Inc.CURLFedora Project
Product-libcurlpeoplesoft_enterprise_peopletoolscommunications_billing_and_revenue_managementhci_storage_nodehci_storage_node_firmwarehci_bootstrap_osmacosuniversal_forwarderhci_compute_nodecommunications_cloud_native_core_policysolidfiresinec_infrastructure_network_servicesclustered_data_ontapsimatic_tim_1531_irc_firmwaredebian_linuxessbasehci_management_nodefedoramac_os_xsimatic_tim_1531_irchttps://github.com/curl/curl
CWE ID-CWE-295
Improper Certificate Validation
CVE-2024-0853
Matching Score-6
Assigner-curl
ShareView Details
Matching Score-6
Assigner-curl
CVSS Score-5.3||MEDIUM
EPSS-0.19% / 40.20%
||
7 Day CHG~0.00%
Published-03 Feb, 2024 | 13:35
Updated-20 Jun, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OCSP verification bypass with TLS session reuse

curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (*OCSP stapling*) test failed. A subsequent transfer to the same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check.

Action-Not Available
Vendor-CURL
Product-curlcurl
CWE ID-CWE-295
Improper Certificate Validation
CVE-2016-9952
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-0.58% / 69.02%
||
7 Day CHG~0.00%
Published-12 Mar, 2018 | 21:00
Updated-07 Aug, 2024 | 19:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The verify_certificate function in lib/vtls/schannel.c in libcurl 7.30.0 through 7.51.0, when built for Windows CE using the schannel TLS backend, makes it easier for remote attackers to conduct man-in-the-middle attacks via a crafted wildcard SAN in a server certificate, as demonstrated by "*.com."

Action-Not Available
Vendor-n/aMicrosoft CorporationCURL
Product-curlwindows_embedded_compactn/acurl
CWE ID-CWE-295
Improper Certificate Validation
CVE-2025-13034
Matching Score-6
Assigner-curl
ShareView Details
Matching Score-6
Assigner-curl
CVSS Score-5.9||MEDIUM
EPSS-0.01% / 1.60%
||
7 Day CHG~0.00%
Published-08 Jan, 2026 | 10:00
Updated-20 Jan, 2026 | 14:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
No QUIC certificate pinning with GnuTLS

When using `CURLOPT_PINNEDPUBLICKEY` option with libcurl or `--pinnedpubkey` with the curl tool,curl should check the public key of the server certificate to verify the peer. This check was skipped in a certain condition that would then make curl allow the connection without performing the proper check, thus not noticing a possible impostor. To skip this check, the connection had to be done with QUIC with ngtcp2 built to use GnuTLS and the user had to explicitly disable the standard certificate verification.

Action-Not Available
Vendor-CURL
Product-curlcurl
CWE ID-CWE-295
Improper Certificate Validation
CVE-2017-7468
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.54% / 67.80%
||
7 Day CHG~0.00%
Published-16 Jul, 2018 | 13:00
Updated-05 Aug, 2024 | 16:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In curl and libcurl 7.52.0 to and including 7.53.1, libcurl would attempt to resume a TLS session even if the client certificate had changed. That is unacceptable since a server by specification is allowed to skip the client certificate check on resume, and may instead use the old identity which was established by the previous certificate (or no certificate). libcurl supports by default the use of TLS session id/ticket to resume previous TLS sessions to speed up subsequent TLS handshakes. They are used when for any reason an existing TLS connection couldn't be kept alive to make the next handshake faster. This flaw is a regression and identical to CVE-2016-5419 reported on August 3rd 2016, but affecting a different version range.

Action-Not Available
Vendor-[UNKNOWN]CURL
Product-libcurlcurl
CWE ID-CWE-295
Improper Certificate Validation
CVE-2023-28321
Matching Score-6
Assigner-HackerOne
ShareView Details
Matching Score-6
Assigner-HackerOne
CVSS Score-5.9||MEDIUM
EPSS-0.27% / 50.74%
||
7 Day CHG~0.00%
Published-26 May, 2023 | 00:00
Updated-15 Jan, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.

Action-Not Available
Vendor-n/aNetApp, Inc.Debian GNU/LinuxApple Inc.CURLFedora Project
Product-macosfedorah410s_firmwareh410scurlh500s_firmwaredebian_linuxh700s_firmwareontap_antivirus_connectorh500sh300s_firmwareclustered_data_ontaph700sh300shttps://github.com/curl/curl
CWE ID-CWE-295
Improper Certificate Validation
CVE-2023-23914
Matching Score-6
Assigner-HackerOne
ShareView Details
Matching Score-6
Assigner-HackerOne
CVSS Score-9.1||CRITICAL
EPSS-0.11% / 28.63%
||
7 Day CHG~0.00%
Published-23 Feb, 2023 | 00:00
Updated-12 Mar, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A cleartext transmission of sensitive information vulnerability exists in curl <v7.88.0 that could cause HSTS functionality fail when multiple URLs are requested serially. Using its HSTS support, curl can be instructed to use HTTPS instead of usingan insecure clear-text HTTP step even when HTTP is provided in the URL. ThisHSTS mechanism would however surprisingly be ignored by subsequent transferswhen done on the same command line because the state would not be properlycarried on.

Action-Not Available
Vendor-n/aNetApp, Inc.Splunk LLC (Cisco Systems, Inc.)CURL
Product-active_iq_unified_managerh410s_firmwareh300sh500sh500s_firmwarecurlh700s_firmwareh410sclustered_data_ontaph300s_firmwareuniversal_forwarderh700shttps://github.com/curl/curl
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2023-23915
Matching Score-6
Assigner-HackerOne
ShareView Details
Matching Score-6
Assigner-HackerOne
CVSS Score-6.5||MEDIUM
EPSS-0.04% / 11.66%
||
7 Day CHG~0.00%
Published-23 Feb, 2023 | 00:00
Updated-13 Feb, 2026 | 21:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A cleartext transmission of sensitive information vulnerability exists in curl <v7.88.0 that could cause HSTS functionality to behave incorrectly when multiple URLs are requested in parallel. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. This HSTS mechanism would however surprisingly fail when multiple transfers are done in parallel as the HSTS cache file gets overwritten by the most recentlycompleted transfer. A later HTTP-only transfer to the earlier host name would then *not* get upgraded properly to HSTS.

Action-Not Available
Vendor-n/aSplunk LLC (Cisco Systems, Inc.)NetApp, Inc.CURL
Product-active_iq_unified_managerh500sh300s_firmwareh300suniversal_forwarderh500s_firmwareh700s_firmwareh410s_firmwareh410sh700sclustered_data_ontapcurlhttps://github.com/curl/curl
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2025-5025
Matching Score-6
Assigner-curl
ShareView Details
Matching Score-6
Assigner-curl
CVSS Score-4.8||MEDIUM
EPSS-0.06% / 18.85%
||
7 Day CHG~0.00%
Published-28 May, 2025 | 06:29
Updated-30 Jul, 2025 | 19:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
No QUIC certificate pinning with wolfSSL

libcurl supports *pinning* of the server certificate public key for HTTPS transfers. Due to an omission, this check is not performed when connecting with QUIC for HTTP/3, when the TLS backend is wolfSSL. Documentation says the option works with wolfSSL, failing to specify that it does not for QUIC and HTTP/3. Since pinning makes the transfer succeed if the pin is fine, users could unwittingly connect to an impostor server without noticing.

Action-Not Available
Vendor-CURL
Product-curlcurl
CWE ID-CWE-295
Improper Certificate Validation
CVE-2024-48894
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-5.9||MEDIUM
EPSS-0.06% / 17.15%
||
7 Day CHG+0.02%
Published-01 Dec, 2025 | 15:25
Updated-05 Dec, 2025 | 21:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A cleartext transmission vulnerability exists in the WEBVIEW-M functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted HTTP request can lead to a disclosure of sensitive information. An attacker can sniff network traffic to trigger this vulnerability.

Action-Not Available
Vendor-socomecSocomec
Product-diris_m-70diris_m-70_firmwareDIRIS Digiware M-70
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2022-45480
Matching Score-4
Assigner-Black Duck Software, Inc.
ShareView Details
Matching Score-4
Assigner-Black Duck Software, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.15% / 34.89%
||
7 Day CHG~0.00%
Published-02 Dec, 2022 | 00:00
Updated-24 Apr, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

PC Keyboard WiFi & Bluetooth allows an attacker (in a man-in-the-middle position between the server and a connected device) to see all data (including keypresses) in cleartext. CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Action-Not Available
Vendor-beappsmobileTelepad
Product-pc_keyboard_wifi_\&_bluetoothPC Keyboard WiFi & Bluetooth
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2022-45856
Matching Score-4
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-4
Assigner-Fortinet, Inc.
CVSS Score-4.6||MEDIUM
EPSS-0.18% / 39.79%
||
7 Day CHG~0.00%
Published-10 Sep, 2024 | 14:37
Updated-26 Sep, 2024 | 14:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper certificate validation vulnerability [CWE-295] in FortiClientWindows 6.4 all versions, 7.0.0 through 7.0.7, FortiClientMac 6.4 all versions, 7.0 all versions, 7.2.0 through 7.2.4, FortiClientLinux 6.4 all versions, 7.0 all versions, 7.2.0 through 7.2.4, FortiClientAndroid 6.4 all versions, 7.0 all versions, 7.2.0 and FortiClientiOS 5.6 all versions, 6.0.0 through 6.0.1, 7.0.0 through 7.0.6 SAML SSO feature may allow an unauthenticated attacker to man-in-the-middle the communication between the FortiClient and  both the service provider and the identity provider.

Action-Not Available
Vendor-Fortinet, Inc.
Product-forticlientFortiClientiOSFortiClientMacFortiClientWindowsFortiClientAndroidFortiClientLinux
CWE ID-CWE-295
Improper Certificate Validation
CVE-2022-45478
Matching Score-4
Assigner-Black Duck Software, Inc.
ShareView Details
Matching Score-4
Assigner-Black Duck Software, Inc.
CVSS Score-5.1||MEDIUM
EPSS-0.08% / 24.56%
||
7 Day CHG~0.00%
Published-05 Dec, 2022 | 00:00
Updated-23 Apr, 2025 | 19:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Telepad allows an attacker (in a man-in-the-middle position between the server and a connected device) to see all data (including keypresses) in cleartext. CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Action-Not Available
Vendor-telepad-appTelepad
Product-telepadTelepad
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2023-31421
Matching Score-4
Assigner-Elastic
ShareView Details
Matching Score-4
Assigner-Elastic
CVSS Score-5.9||MEDIUM
EPSS-0.09% / 25.96%
||
7 Day CHG~0.00%
Published-26 Oct, 2023 | 03:10
Updated-02 Aug, 2024 | 14:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Beats, Elastic Agent, APM Server, and Fleet Server Improper Certificate Validation issue

It was discovered that when acting as TLS clients, Beats, Elastic Agent, APM Server, and Fleet Server did not verify whether the server certificate is valid for the target IP address; however, certificate signature validation is still performed. More specifically, when the client is configured to connect to an IP address (instead of a hostname) it does not validate the server certificate's IP SAN values against that IP address and certificate validation fails, and therefore the connection is not blocked as expected.

Action-Not Available
Vendor-Elasticsearch BV
Product-elastic_fleet_serverapm_serverelastic_beatselastic_agentElastic AgentBeatsAPM ServerFleet Server
CWE ID-CWE-295
Improper Certificate Validation
CVE-2014-2845
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.13% / 32.04%
||
7 Day CHG~0.00%
Published-15 Nov, 2017 | 18:00
Updated-13 May, 2026 | 00:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cyberduck before 4.4.4 on Windows does not properly validate X.509 certificate chains, which allows man-in-the-middle attackers to spoof FTP-SSL servers via a certificate issued by an arbitrary root Certification Authority.

Action-Not Available
Vendor-cyberduckn/aMicrosoft Corporation
Product-windowscyberduckn/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2025-36107
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.03% / 8.69%
||
7 Day CHG~0.00%
Published-21 Jul, 2025 | 18:07
Updated-18 Aug, 2025 | 01:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Cognos Analytics Mobile (iOS) information disclosure

IBM Cognos Analytics Mobile (iOS) 1.1.0 through 1.1.22 could allow malicious actors to obtain sensitive information due to the cleartext transmission of data.

Action-Not Available
Vendor-IBM Corporation
Product-cognos_analytics_mobileCognos Analytics Mobile
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2026-41016
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-5.9||MEDIUM
EPSS-0.06% / 19.25%
||
7 Day CHG+0.01%
Published-30 Apr, 2026 | 09:09
Updated-01 May, 2026 | 17:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache Airflow Providers SMTP: No certificate validation on SMTP STARTTLS connections in SMTP provider

Apache Airflow's SMTP provider `SmtpHook` called Python's `smtplib.SMTP.starttls()` without an SSL context, so no certificate validation was performed on the TLS upgrade. A man-in-the-middle between the Airflow worker and the SMTP server could present a self-signed certificate, complete the STARTTLS upgrade, and capture the SMTP credentials sent during the subsequent `login()` call. Users are advised to upgrade to the `apache-airflow-providers-smtp` version that contains the fix.

Action-Not Available
Vendor-The Apache Software Foundation
Product-airflowApache Airflow Providers SMTP
CWE ID-CWE-295
Improper Certificate Validation
CVE-2025-33099
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.02% / 6.54%
||
7 Day CHG~0.00%
Published-01 Sep, 2025 | 14:19
Updated-03 Sep, 2025 | 16:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Concert Software information disclosure

IBM Concert Software 1.0.0 through 1.1.0 could allow a remote attacker to perform unauthorized actions using man in the middle techniques due to improper certificate validation.

Action-Not Available
Vendor-IBM Corporation
Product-concertConcert Software
CWE ID-CWE-295
Improper Certificate Validation
CVE-2022-38458
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-6.5||MEDIUM
EPSS-0.28% / 51.28%
||
7 Day CHG~0.00%
Published-21 Mar, 2023 | 17:41
Updated-26 Feb, 2025 | 16:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A cleartext transmission vulnerability exists in the Remote Management functionality of Netgear Orbi Router RBR750 4.6.8.5. A specially-crafted man-in-the-middle attack can lead to a disclosure of sensitive information.

Action-Not Available
Vendor-NETGEAR, Inc.
Product-rbs750_firmwarerbs750Orbi Router RBR750
CWE ID-CWE-311
Missing Encryption of Sensitive Data
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2022-38846
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.12% / 31.35%
||
7 Day CHG~0.00%
Published-16 Sep, 2022 | 13:15
Updated-03 Aug, 2024 | 11:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

EspoCRM version 7.1.8 is vulnerable to Missing Secure Flag allowing the browser to send plain text cookies over an insecure channel (HTTP). An attacker may capture the cookie from the insecure channel using MITM attack.

Action-Not Available
Vendor-espocrmn/a
Product-espocrmn/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2026-35560
Matching Score-4
Assigner-Amazon
ShareView Details
Matching Score-4
Assigner-Amazon
CVSS Score-9.1||CRITICAL
EPSS-0.02% / 3.63%
||
7 Day CHG~0.00%
Published-03 Apr, 2026 | 20:10
Updated-14 Apr, 2026 | 16:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper certificate validation in identity provider connection components in Amazon Athena ODBC driver

Improper certificate validation in the identity provider connection components in Amazon Athena ODBC driver before 2.1.0.0 might allow a man-in-the-middle threat actor to intercept authentication credentials due to insufficient default transport security when connecting to identity providers. This only applies to connections with external identity providers and does not apply to connections with Athena. To remediate this issue, users should upgrade to version 2.1.0.0.

Action-Not Available
Vendor-amazonAmazonApple Inc.Microsoft CorporationLinux Kernel Organization, Inc
Product-linux_kernelathena_odbcwindowsmacosAmazon Athena ODBC driver
CWE ID-CWE-295
Improper Certificate Validation
CVE-2025-32407
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.04% / 11.05%
||
7 Day CHG~0.00%
Published-16 May, 2025 | 00:00
Updated-12 Jun, 2025 | 16:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Samsung Internet for Galaxy Watch version 5.0.9, available up until Samsung Galaxy Watch 3, does not properly validate TLS certificates, allowing for an attacker to impersonate any and all websites visited by the user. This is a critical misconfiguration in the way the browser validates the identity of the server. It negates the use of HTTPS as a secure channel, allowing for Man-in-the-Middle attacks, stealing sensitive information or modifying incoming and outgoing traffic. NOTE: This vulnerability is in an end-of-life product that is no longer maintained by the vendor.

Action-Not Available
Vendor-n/aSamsung
Product-internetn/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2025-36020
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.03% / 8.32%
||
7 Day CHG~0.00%
Published-06 Aug, 2025 | 14:28
Updated-22 Oct, 2025 | 18:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Guardium Data Protection information disclosure

IBM Guardium Data Protection could allow a remote attacker to obtain sensitive information due to cleartext transmission of sensitive credential information.

Action-Not Available
Vendor-IBM Corporation
Product-guardium_data_protectionGuardium Data Protection
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2025-36005
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.03% / 9.24%
||
7 Day CHG~0.00%
Published-24 Jul, 2025 | 14:52
Updated-22 Aug, 2025 | 18:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM MQ Operator information disclosure

IBM MQ Operator LTS 2.0.0 through 2.0.29, MQ Operator CD 3.0.0, 3.0.1, 3.1.0 through 3.1.3, 3.3.0, 3.4.0, 3.4.1, 3.5.0, 3.5.1, 3.6.0, and MQ Operator SC2 3.2.0 through 3.2.13 Internet Pass-Thru could allow a malicious user to obtain sensitive information from another TLS session connection by the proxy to the same hostname and port due to improper certificate validation.

Action-Not Available
Vendor-IBM Corporation
Product-supplied_mq_advanced_container_imagesmq_operatorMQ Operator
CWE ID-CWE-295
Improper Certificate Validation
CVE-2026-32838
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-8.7||HIGH
EPSS-0.01% / 0.41%
||
7 Day CHG~0.00%
Published-17 Mar, 2026 | 21:42
Updated-08 May, 2026 | 14:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Edimax GS-5008PL <= 1.00.54 Transmits Credentials Over Cleartext HTTP

Edimax GS-5008PL firmware version 1.00.54 and prior use cleartext HTTP for the web management interface without implementing TLS or SSL encryption. Attackers on the same network can intercept management traffic to capture administrator credentials and sensitive configuration data.

Action-Not Available
Vendor-Edimax Technology Company Ltd.
Product-gs-5008pl_firmwaregs-5008plEdimax GS-5008PL
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2025-36034
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.07% / 21.56%
||
7 Day CHG~0.00%
Published-26 Jun, 2025 | 15:14
Updated-26 Aug, 2025 | 14:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM InfoSphere DataStage Flow Designer information disclosure

IBM InfoSphere DataStage Flow Designer in IBM InfoSphere Information Server 11.7 discloses sensitive user information in API requests in clear text that could be intercepted using man in the middle techniques.

Action-Not Available
Vendor-IBM Corporation
Product-infosphere_information_serverInfoSphere Information Server
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2026-33308
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.01% / 1.74%
||
7 Day CHG~0.00%
Published-24 Mar, 2026 | 01:36
Updated-24 Mar, 2026 | 19:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
mod_gnutls missing key purpose check in client certificate verification

Mod_gnutls is a TLS module for Apache HTTPD based on GnuTLS. Prior to version 0.13.0, code for client certificate verification did not check the key purpose as set in the Extended Key Usage extension. An attacker with access to the private key for a valid certificate issued by a CA trusted for TLS client authentication but designated for a different purpose could have used that certificate to improperly access resources requiring TLS client authentication. Server configurations that do not use client certificates (`GnuTLSClientVerify ignore`, the default) are not affected. The problem has been fixed in version 0.13.0 by rewriting certificate verification to use `gnutls_certificate_verify_peers()`, and requiring key purpose id-kp-clientAuth (also known as `tls_www_client` in GnuTLS) by default if the Extended Key Usage extension is present. The new `GnuTLSClientKeyPurpose` option allows overriding the expected key purpose if needed (please see the manual for details). Behavior for certificates without an Extended Key Usage extension is unchanged. If dedicated (sub-)CAs are used for issuing TLS client certificates only (not for any other purposes) the issue has no practical impact.

Action-Not Available
Vendor-mod_gnutls_projectairtower-luna
Product-mod_gnutlsmod_gnutls
CWE ID-CWE-295
Improper Certificate Validation
CVE-2020-35584
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.18% / 38.68%
||
7 Day CHG~0.00%
Published-23 Dec, 2020 | 14:53
Updated-04 Aug, 2024 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Solstice Pod before 3.0.3, the web services allow users to connect to them over unencrypted channels via the Browser Look-in feature. An attacker suitably positioned to view a legitimate user's network traffic could record and monitor their interactions with the web services and obtain any information the user supplies, including Administrator passwords and screen keys.

Action-Not Available
Vendor-mersiven/a
Product-solstice_pod_firmwaresolstice_podn/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2022-3761
Matching Score-4
Assigner-OpenVPN Inc.
ShareView Details
Matching Score-4
Assigner-OpenVPN Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.14% / 34.26%
||
7 Day CHG~0.00%
Published-17 Oct, 2023 | 12:10
Updated-03 Aug, 2024 | 01:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OpenVPN Connect versions before 3.4.0.4506 (macOS) and OpenVPN Connect before 3.4.0.3100 (Windows) allows man-in-the-middle attackers to intercept configuration profile download requests which contains the users credentials

Action-Not Available
Vendor-openvpnOpenVPN Inc
Product-connectOpenVPN Connect
CWE ID-CWE-295
Improper Certificate Validation
CVE-2020-28972
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.80% / 74.26%
||
7 Day CHG~0.00%
Published-27 Feb, 2021 | 00:00
Updated-04 Aug, 2024 | 16:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In SaltStack Salt before 3002.5, authentication to VMware vcenter, vsphere, and esxi servers (in the vmware.py files) does not always validate the SSL/TLS certificate.

Action-Not Available
Vendor-saltstackn/aDebian GNU/LinuxFedora Project
Product-debian_linuxfedorasaltn/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2026-27752
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-8.2||HIGH
EPSS-0.02% / 4.35%
||
7 Day CHG~0.00%
Published-27 Feb, 2026 | 18:08
Updated-03 Mar, 2026 | 19:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SODOLA SL902-SWTGW124AS <= 200.1.20 Cleartext Credential Transmission

SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 transmit authentication credentials over unencrypted HTTP, allowing attackers to capture credentials. An attacker positioned to observe network traffic between a user and the device can intercept credentials and reuse them to gain administrative access to the gateway.

Action-Not Available
Vendor-sodola-networkShenzhen Hongyavision Technology Co., Ltd. (Sodola Networks)
Product-sl902-swtgw124assl902-swtgw124as_firmwareSODOLA SL902-SWTGW124AS
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2025-27903
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.02% / 3.65%
||
7 Day CHG~0.00%
Published-17 Feb, 2026 | 19:32
Updated-26 Feb, 2026 | 18:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Multiple vulnerabilities in IBM Java SDK affecting Db2 Recovery Expert for Linux, Unix and Windows

IBM DB2 Recovery Expert for LUW 5.5 Interim Fix 002 IBM Db2 Recovery Expert for Linux, UNIX and Windows transmits data in a cleartext communication channel that could allow an attacker to obtain sensitive information using man in the middle techniques.

Action-Not Available
Vendor-IBM Corporation
Product-db2_recovery_expertDB2 Recovery Expert for LUW
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2026-24932
Matching Score-4
Assigner-ASUSTOR, Inc.
ShareView Details
Matching Score-4
Assigner-ASUSTOR, Inc.
CVSS Score-8.9||HIGH
EPSS-0.01% / 2.02%
||
7 Day CHG~0.00%
Published-03 Feb, 2026 | 02:19
Updated-19 Feb, 2026 | 18:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
An improper certificate validation vulnerability was found in ADM while updating the DDNS settings.

The DDNS update function in ADM fails to properly validate the hostname of the DDNS server's TLS/SSL certificate. Although the connection uses HTTPS, an improper validated TLS/SSL certificates allows a remote attacker can intercept the communication to perform a Man-in-the-Middle (MitM) attack, which may obtain the sensitive information of DDNS updating process, including the user's account email, MD5 hashed password, and device serial number.This issue affects ADM: from 4.1.0 through 4.3.3.ROF1, from 5.0.0 through 5.1.1.RCI1.

Action-Not Available
Vendor-ASUSTOR Inc.
Product-data_masterADM
CWE ID-CWE-295
Improper Certificate Validation
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next
Details not found