5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
6.5 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
24.2%
curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (OCSP stapling) test failed. A subsequent transfer to the same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | curl | < 7.88.1-10+deb12u6 | curl_7.88.1-10+deb12u6_all.deb |
Debian | 11 | all | curl | < 7.74.0-1.3+deb11u12 | curl_7.74.0-1.3+deb11u12_all.deb |
Debian | 999 | all | curl | < 8.6.0-1 | curl_8.6.0-1_all.deb |
Debian | 13 | all | curl | < 8.6.0-1 | curl_8.6.0-1_all.deb |
5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
6.5 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
24.2%