libcurl did not check the server certificate of TLS connections done to a host specified as an IP address, when built to use mbedTLS. libcurl would wrongly avoid using the set hostname function when the specified hostname was given as an IP address, therefore completely skipping the certificate check. This affects all uses of TLS protocols (HTTPS, FTPS, IMAPS, POPS3, SMTPS, etc).
CVSS
No CVSS.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
History
30 Jul 2025, 19:42
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:* cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:* cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:* |
|
References |
|
|
References | () http://seclists.org/fulldisclosure/2024/Jul/20 - Mailing List, Third Party Advisory | |
References | () https://support.apple.com/kb/HT214119 - Release Notes, Vendor Advisory | |
References | () https://curl.se/docs/CVE-2024-2466.json - Vendor Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/03/27/4 - Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2024/Jul/18 - Mailing List, Third Party Advisory | |
References | () https://curl.se/docs/CVE-2024-2466.html - Vendor Advisory | |
References | () https://support.apple.com/kb/HT214118 - Release Notes, Vendor Advisory | |
References | () http://seclists.org/fulldisclosure/2024/Jul/19 - Mailing List, Third Party Advisory | |
References | () https://support.apple.com/kb/HT214120 - Release Notes, Vendor Advisory | |
References | () https://security.netapp.com/advisory/ntap-20240503-0010/ - Third Party Advisory | |
References | () https://hackerone.com/reports/2416725 - Exploit, Issue Tracking, Third Party Advisory | |
First Time |
Netapp h410s Firmware
Netapp h700s Firmware Haxx Netapp h300s Firmware Haxx curl Netapp hci Compute Node Apple Apple macos Netapp h300s Netapp Netapp h410s Netapp h500s Netapp h500s Firmware Netapp h700s Netapp bootstrap Os |
30 Jul 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
29 Jul 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
03 May 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 May 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
27 Mar 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-27 08:15
Updated : 2025-07-30 19:42
NVD link : CVE-2024-2466
Mitre link : CVE-2024-2466
JSON object : View
Products Affected
netapp
- h410s
- h500s
- bootstrap_os
- h700s_firmware
- h300s
- h410s_firmware
- h500s_firmware
- h700s
- h300s_firmware
- hci_compute_node
haxx
- curl
apple
- macos
CWE
No CWE.