curl's code for managing SSH connections when SFTP was done using the wolfSSH
powered backend was flawed and missed host verification mechanisms.
This prevents curl from detecting MITM attackers and more.
powered backend was flawed and missed host verification mechanisms.
This prevents curl from detecting MITM attackers and more.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sat, 08 Nov 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-322 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Fri, 07 Nov 2025 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 07 Nov 2025 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | curl's code for managing SSH connections when SFTP was done using the wolfSSH powered backend was flawed and missed host verification mechanisms. This prevents curl from detecting MITM attackers and more. | |
| Title | missing SFTP host verification with wolfSSH | |
| References |
|
Status: PUBLISHED
Assigner: curl
Published:
Updated: 2025-11-07T08:05:50.150Z
Reserved: 2025-09-25T10:15:10.502Z
Link: CVE-2025-10966
No data.
Status : Received
Published: 2025-11-07T08:15:39.617
Modified: 2025-11-07T08:15:39.617
Link: CVE-2025-10966
OpenCVE Enrichment
No data.