curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (*OCSP stapling*) test failed. A subsequent transfer to
the same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00156}

epss

{'score': 0.0016}


Fri, 20 Jun 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: curl

Published:

Updated: 2025-06-20T20:04:09.066Z

Reserved: 2024-01-24T08:42:02.618Z

Link: CVE-2024-0853

cve-icon Vulnrichment

Updated: 2024-08-01T18:18:19.012Z

cve-icon NVD

Status : Modified

Published: 2024-02-03T14:15:50.850

Modified: 2025-06-20T20:15:27.820

Link: CVE-2024-0853

cve-icon Redhat

Severity : Low

Publid Date: 2024-01-31T00:00:00Z

Links: CVE-2024-0853 - Bugzilla

cve-icon OpenCVE Enrichment

No data.