CVE-2016-5420
moderate-risk
Published 2016-08-10
curl and libcurl before 7.50.1 do not check the client certificate when choosing the TLS connection to reuse, which might allow remote attackers to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate.
Do I need to act?
~
1.1% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (3)
References (36)
Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html
Third Party Advisory
http://www.debian.org/security/2016/dsa-3638
Mitigation
https://curl.haxx.se/docs/adv_20160803B.html
Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html
and 16 more references
38
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
3/34 · Minimal
Exposure
9/34 · Low