CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2024-2379: QUIC certificate check bypass with wolfSSL

Description

libcurl skips the certificate verification for a QUIC connection under certain conditions, when built to use wolfSSL. If told to use an unknown/bad cipher or curve, the error path accidentally skips the verification and returns OK, thus ignoring any certificate problems.

Classification

CVE ID: CVE-2024-2379

Affected Products

Vendor: curl

Product: curl

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.04% (probability of being exploited)

EPSS Percentile: 15.83% (scored less or equal to compared to others)

EPSS Date: 2025-03-14 (when was this score calculated)

References

https://curl.se/docs/CVE-2024-2379.json
https://curl.se/docs/CVE-2024-2379.html
https://hackerone.com/reports/2410774
http://www.openwall.com/lists/oss-security/2024/03/27/2
https://security.netapp.com/advisory/ntap-20240531-0001/
https://support.apple.com/kb/HT214119
https://support.apple.com/kb/HT214118
https://support.apple.com/kb/HT214120
http://seclists.org/fulldisclosure/2024/Jul/20
http://seclists.org/fulldisclosure/2024/Jul/18
http://seclists.org/fulldisclosure/2024/Jul/19

Timeline