Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2024-2466
Analyzed
More InfoOfficial Page
Source-2499f714-1537-4658-8207-48ae4bb9eae9
View Known Exploited Vulnerability (KEV) details
Published At-27 Mar, 2024 | 08:15
Updated At-30 Jul, 2025 | 19:42

libcurl did not check the server certificate of TLS connections done to a host specified as an IP address, when built to use mbedTLS. libcurl would wrongly avoid using the set hostname function when the specified hostname was given as an IP address, therefore completely skipping the certificate check. This affects all uses of TLS protocols (HTTPS, FTPS, IMAPS, POPS3, SMTPS, etc).

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.16.5MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
CPE Matches

CURL
haxx
>>curl>>Versions from 8.5.0(inclusive) to 8.7.0(exclusive)
cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
Apple Inc.
apple
>>macos>>Versions before 12.7.6(exclusive)
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
Apple Inc.
apple
>>macos>>Versions from 13.0(inclusive) to 13.6.8(exclusive)
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
Apple Inc.
apple
>>macos>>Versions from 14.0(inclusive) to 14.6(exclusive)
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>h700s_firmware>>-
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>h700s>>-
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>bootstrap_os>>-
cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>hci_compute_node>>-
cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>h300s_firmware>>-
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>h300s>>-
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>h410s_firmware>>-
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>h410s>>-
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>h500s_firmware>>-
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>h500s>>-
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-297Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://seclists.org/fulldisclosure/2024/Jul/182499f714-1537-4658-8207-48ae4bb9eae9
Mailing List
Third Party Advisory
http://seclists.org/fulldisclosure/2024/Jul/192499f714-1537-4658-8207-48ae4bb9eae9
Mailing List
Third Party Advisory
http://seclists.org/fulldisclosure/2024/Jul/202499f714-1537-4658-8207-48ae4bb9eae9
Mailing List
Third Party Advisory
http://www.openwall.com/lists/oss-security/2024/03/27/42499f714-1537-4658-8207-48ae4bb9eae9
Mailing List
Third Party Advisory
https://curl.se/docs/CVE-2024-2466.html2499f714-1537-4658-8207-48ae4bb9eae9
Vendor Advisory
https://curl.se/docs/CVE-2024-2466.json2499f714-1537-4658-8207-48ae4bb9eae9
Vendor Advisory
https://hackerone.com/reports/24167252499f714-1537-4658-8207-48ae4bb9eae9
Exploit
Issue Tracking
Third Party Advisory
https://security.netapp.com/advisory/ntap-20240503-0010/2499f714-1537-4658-8207-48ae4bb9eae9
Third Party Advisory
https://support.apple.com/kb/HT2141182499f714-1537-4658-8207-48ae4bb9eae9
Release Notes
Vendor Advisory
https://support.apple.com/kb/HT2141192499f714-1537-4658-8207-48ae4bb9eae9
Release Notes
Vendor Advisory
https://support.apple.com/kb/HT2141202499f714-1537-4658-8207-48ae4bb9eae9
Release Notes
Vendor Advisory
http://seclists.org/fulldisclosure/2024/Jul/18af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://seclists.org/fulldisclosure/2024/Jul/19af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://seclists.org/fulldisclosure/2024/Jul/20af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://www.openwall.com/lists/oss-security/2024/03/27/4af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://curl.se/docs/CVE-2024-2466.htmlaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://curl.se/docs/CVE-2024-2466.jsonaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://hackerone.com/reports/2416725af854a3a-2127-422b-91ae-364da2661108
Exploit
Issue Tracking
Third Party Advisory
https://security.netapp.com/advisory/ntap-20240503-0010/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://support.apple.com/kb/HT214118af854a3a-2127-422b-91ae-364da2661108
Release Notes
Vendor Advisory
https://support.apple.com/kb/HT214119af854a3a-2127-422b-91ae-364da2661108
Release Notes
Vendor Advisory
https://support.apple.com/kb/HT214120af854a3a-2127-422b-91ae-364da2661108
Release Notes
Vendor Advisory
https://www.vicarius.io/vsociety/posts/tls-certificate-check-bypass-curl-with-mbedtls-cve-2024-2466-2468af854a3a-2127-422b-91ae-364da2661108
Exploit
Mitigation
Third Party Advisory
Change History
0Changes found

Details not found