Vulnerability Name:

CVE-2020-8286 (CCN-192856)

Assigned:2020-12-09
Published:2020-12-09
Updated:2022-05-13
Summary:curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response.
CVSS v3 Severity:7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)
6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): High
Availibility (A): None
7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): High
Availibility (A): None
7.4 High (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)
6.4 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): None
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:C/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Complete
Availibility (A): None
Vulnerability Type:CWE-295
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2020-8286

Source: FULLDISC
Type: Mailing List, Third Party Advisory
20210427 APPLE-SA-2021-04-26-2 macOS Big Sur 11.3

Source: FULLDISC
Type: Mailing List, Third Party Advisory
20210427 APPLE-SA-2021-04-26-3 Security Update 2021-002 Catalina

Source: FULLDISC
Type: Mailing List, Third Party Advisory
20210427 APPLE-SA-2021-04-26-4 Security Update 2021-003 Mojave

Source: CONFIRM
Type: Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-200951.pdf

Source: CONFIRM
Type: Patch, Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf

Source: CCN
Type: Project curl Security Advisory, December 9th 2020
Inferior OCSP verification

Source: MISC
Type: Vendor Advisory
https://curl.se/docs/CVE-2020-8286.html

Source: XF
Type: UNKNOWN
curl-cve20208286-sec-bypass(192856)

Source: MISC
Type: Exploit, Patch, Third Party Advisory
https://hackerone.com/reports/1048457

Source: MLIST
Type: Mailing List, Third Party Advisory
[debian-lts-announce] 20201219 [SECURITY] [DLA 2500-1] curl security update

Source: FEDORA
Type: Mailing List, Third Party Advisory
FEDORA-2020-7ab62c73bc

Source: FEDORA
Type: Mailing List, Third Party Advisory
FEDORA-2020-ceaf490686

Source: GENTOO
Type: Third Party Advisory
GLSA-202012-14

Source: CONFIRM
Type: Third Party Advisory
https://security.netapp.com/advisory/ntap-20210122-0007/

Source: CCN
Type: Apple security document HT212325
About the security content of macOS Big Sur 11.3

Source: CCN
Type: Apple security document HT212326
About the security content of Security Update 2021-002 Catalina

Source: CCN
Type: Apple security document HT212327
About the security content of Security Update 2021-003 Mojave

Source: CONFIRM
Type: Third Party Advisory
https://support.apple.com/kb/HT212325

Source: CONFIRM
Type: Third Party Advisory
https://support.apple.com/kb/HT212326

Source: CONFIRM
Type: Third Party Advisory
https://support.apple.com/kb/HT212327

Source: DEBIAN
Type: Third Party Advisory
DSA-4881

Source: CCN
Type: IBM Security Bulletin 6409294 (Security QRadar Analyst Workflow)
IBM Security QRadar Analyst Workflow add on to IBM QRadar SIEM is vulnerable to using components with known vulnerabilities

Source: CCN
Type: IBM Security Bulletin 6430229 (PowerSC)
Vulnerabilities in Curl affect PowerSC (CVE-2020-8284, CVE-2020-8285, and CVE-2020-8286)

Source: CCN
Type: IBM Security Bulletin 6458643 (Aspera High-Speed Transfer Server (HSTS))
cURL libcurl vulnerabilites impacting Aspera High-Speed Transfer Server, Aspera High-Speed Transfer Endpoint, Aspera Desktop Client 4.0 and earlier (CVE-2020-8284, CVE-2020-8286, CVE-2020-8285)

Source: CCN
Type: IBM Security Bulletin 6459257 (Aspera High-Speed Transfer Server)
cURL libcurl vulnerabilites impacting Aspera High-Speed Transfer Server and Aspera High-Speed Transfer Endpoint 4.0 and earlier (CVE-2020-8284, CVE-2020-8286, CVE-2020-8285)

Source: CCN
Type: IBM Security Bulletin 6493729 (Cloud Pak for Security)
Cloud Pak for Security is vulnerable to several CVEs

Source: CCN
Type: IBM Security Bulletin 6520474 (QRadar SIEM)
IBM QRadar SIEM Application Framework Base Image is vulnerable to using components with Known Vulnerabilities

Source: CCN
Type: IBM Security Bulletin 6574355 (Cloud Private)
Security Vulnerabilities affect IBM Cloud Private - curl (Multiple CVEs)

Source: N/A
Type: Third Party Advisory
N/A

Source: CCN
Type: Oracle Critical Patch Update Advisory - April 2021
Oracle Critical Patch Update Advisory - April 2021

Source: MISC
Type: Third Party Advisory
https://www.oracle.com/security-alerts/cpuApr2021.html

Source: MISC
Type: Patch, Third Party Advisory
https://www.oracle.com/security-alerts/cpuapr2022.html

Source: CCN
Type: Oracle CPUJul2021
Oracle Critical Patch Update Advisory - July 2021

Vulnerable Configuration:Configuration 1:
  • cpe:/a:haxx:libcurl:*:*:*:*:*:*:*:* (Version >= 7.41.0 and < 7.74.0)

  • Configuration 2:
  • cpe:/o:fedoraproject:fedora:32:*:*:*:*:*:*:*
  • OR cpe:/o:fedoraproject:fedora:33:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:debian:debian_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:10.0:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:solidfire:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:hci_management_node:-:*:*:*:*:*:*:*

  • Configuration 5:
  • cpe:/o:netapp:hci_bootstrap_os:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:netapp:hci_compute_node:-:*:*:*:*:*:*:*

  • Configuration 6:
  • cpe:/o:netapp:hci_storage_node_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:netapp:hci_storage_node:-:*:*:*:*:*:*:*

  • Configuration 7:
  • cpe:/o:apple:mac_os_x:*:*:*:*:*:*:*:* (Version < 10.14.6)
  • OR cpe:/o:apple:mac_os_x:*:*:*:*:*:*:*:* (Version >= 10.15 and < 10.15.7)
  • OR cpe:/o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*
  • OR cpe:/o:apple:macos:*:*:*:*:*:*:*:* (Version >= 11.0 and < 11.3)

  • Configuration 8:
  • cpe:/o:siemens:simatic_tim_1531_irc_firmware:*:*:*:*:*:*:*:* (Version <= 2.2)
  • AND
  • cpe:/h:siemens:simatic_tim_1531_irc:-:*:*:*:*:*:*:*

  • Configuration 9:
  • cpe:/a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:* (Version < 1.0.1.1)

  • Configuration 10:
  • cpe:/a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:communications_billing_and_revenue_management:12.0.0.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:essbase:21.2:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:8:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:8::baseos:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:ibm:qradar_security_information_and_event_manager:7.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_private:3.2.1:cd:*:*:*:*:*:*
  • OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.4:-:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_private:3.2.2:cd:*:*:*:*:*:*
  • OR cpe:/a:ibm:aspera_high-speed_transfer_server:4.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_pak_for_security:1.7.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_pak_for_security:1.7.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_pak_for_security:1.7.2.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:7476
    P
    curl-8.0.1-150400.5.23.1 on GA media (Moderate)
    2023-06-12
    oval:org.opensuse.security:def:5329
    P
    Security update for raptor (Moderate)
    2022-08-25
    oval:org.opensuse.security:def:94467
    P
    (Important)
    2022-07-12
    oval:org.opensuse.security:def:3355
    P
    rrdtool-1.4.7-21.3.27 on GA media (Moderate)
    2022-06-28
    oval:org.opensuse.security:def:3186
    P
    libicu-doc-52.1-8.7.1 on GA media (Moderate)
    2022-06-28
    oval:org.opensuse.security:def:94532
    P
    curl-7.79.1-150400.3.1 on GA media (Moderate)
    2022-06-22
    oval:org.opensuse.security:def:2902
    P
    curl-7.79.1-150400.3.1 on GA media (Moderate)
    2022-06-22
    oval:org.opensuse.security:def:95154
    P
    sca-patterns-sle11-1.5.0-150400.1.4 on GA media (Moderate)
    2022-06-22
    oval:org.opensuse.security:def:38
    P
    curl-7.66.0-4.14.1 on GA media (Moderate)
    2022-06-13
    oval:org.opensuse.security:def:967
    P
    Security update for python-libxml2-python (Important)
    2022-03-10
    oval:org.opensuse.security:def:112133
    P
    curl-7.79.1-1.1 on GA media (Moderate)
    2022-01-17
    oval:org.opensuse.security:def:105669
    P
    Security update for python-Pygments (Important)
    2021-12-01
    oval:org.opensuse.security:def:96746
    P
    perl-XML-LibXML-2.0132-1.20 on GA media (Moderate)
    2021-09-21
    oval:org.opensuse.security:def:96747
    P
    policycoreutils-2.8-9.19 on GA media (Moderate)
    2021-09-21
    oval:org.opensuse.security:def:71797
    P
    curl-7.66.0-4.14.1 on GA media (Moderate)
    2021-08-09
    oval:org.opensuse.security:def:100814
    P
    curl-7.66.0-4.14.1 on GA media (Moderate)
    2021-08-09
    oval:org.opensuse.security:def:62056
    P
    curl-7.66.0-4.14.1 on GA media (Moderate)
    2021-08-09
    oval:org.opensuse.security:def:101180
    P
    libXvnc-devel-1.9.0-19.9.1 on GA media (Moderate)
    2021-08-09
    oval:org.opensuse.security:def:101867
    P
    Security update for postgresql10 (Moderate)
    2021-06-14
    oval:org.opensuse.security:def:33913
    P
    Security update for curl (Moderate)
    2021-05-27
    oval:org.opensuse.security:def:88123
    P
    Security update for curl (Moderate)
    2021-05-27
    oval:org.opensuse.security:def:126709
    P
    Security update for curl (Moderate)
    2021-05-27
    oval:org.opensuse.security:def:23906
    P
    Security update for curl (Moderate)
    2021-05-27
    oval:org.opensuse.security:def:88436
    P
    Security update for curl (Moderate)
    2021-05-27
    oval:org.opensuse.security:def:51894
    P
    Security update for curl (Moderate)
    2021-05-27
    oval:org.opensuse.security:def:127106
    P
    Security update for curl (Moderate)
    2021-05-27
    oval:org.opensuse.security:def:89133
    P
    Security update for curl (Moderate)
    2021-05-27
    oval:org.opensuse.security:def:59478
    P
    Security update for curl (Moderate)
    2021-05-27
    oval:org.opensuse.security:def:33655
    P
    Security update for curl (Moderate)
    2021-05-27
    oval:org.opensuse.security:def:125539
    P
    Security update for curl (Moderate)
    2021-05-27
    oval:org.opensuse.security:def:89391
    P
    Security update for curl (Moderate)
    2021-05-27
    oval:org.opensuse.security:def:59736
    P
    Security update for curl (Moderate)
    2021-05-27
    oval:com.redhat.rhsa:def:20211610
    P
    RHSA-2021:1610: curl security and bug fix update (Moderate)
    2021-05-18
    oval:org.opensuse.security:def:110371
    P
    Security update for curl (Moderate)
    2020-12-14
    oval:org.opensuse.security:def:110915
    P
    Security update for curl (Moderate)
    2020-12-13
    oval:org.opensuse.security:def:60155
    P
    Security update for curl (Moderate)
    2020-12-10
    oval:org.opensuse.security:def:4963
    P
    Security update for curl (Moderate)
    2020-12-10
    oval:org.opensuse.security:def:34332
    P
    Security update for curl (Moderate)
    2020-12-10
    oval:org.opensuse.security:def:25976
    P
    Security update for curl (Moderate)
    2020-12-10
    oval:org.opensuse.security:def:104079
    P
    Security update for curl (Moderate)
    2020-12-09
    oval:org.opensuse.security:def:64444
    P
    Security update for curl (Moderate)
    2020-12-09
    oval:org.opensuse.security:def:75763
    P
    Security update for curl (Moderate)
    2020-12-09
    oval:org.opensuse.security:def:97389
    P
    Security update for curl (Moderate)
    2020-12-09
    oval:org.opensuse.security:def:91125
    P
    Security update for curl (Moderate)
    2020-12-09
    oval:org.opensuse.security:def:73397
    P
    Security update for curl (Moderate)
    2020-12-09
    oval:org.opensuse.security:def:99917
    P
    (Moderate)
    2020-12-09
    oval:org.opensuse.security:def:104780
    P
    Security update for curl (Moderate)
    2020-12-09
    oval:org.opensuse.security:def:66418
    P
    Security update for curl (Moderate)
    2020-12-09
    oval:org.opensuse.security:def:98090
    P
    Security update for curl (Moderate)
    2020-12-09
    oval:org.opensuse.security:def:73566
    P
    Security update for curl (Moderate)
    2020-12-09
    oval:org.opensuse.security:def:117361
    P
    Security update for curl (Moderate)
    2020-12-09
    oval:org.opensuse.security:def:100254
    P
    (Moderate)
    2020-12-09
    oval:org.opensuse.security:def:107846
    P
    Security update for curl (Moderate)
    2020-12-09
    oval:org.opensuse.security:def:66695
    P
    Security update for curl (Moderate)
    2020-12-09
    oval:org.opensuse.security:def:5606
    P
    Security update for curl (Moderate)
    2020-12-09
    oval:org.opensuse.security:def:64275
    P
    Security update for curl (Moderate)
    2020-12-09
    oval:org.opensuse.security:def:75486
    P
    Security update for curl (Moderate)
    2020-12-09
    oval:org.opensuse.security:def:100585
    P
    (Moderate)
    2020-12-09
    oval:org.opensuse.security:def:108533
    P
    Security update for curl (Moderate)
    2020-12-09
    oval:org.opensuse.security:def:90424
    P
    Security update for curl (Moderate)
    2020-12-09
    BACK
    haxx libcurl *
    fedoraproject fedora 32
    fedoraproject fedora 33
    debian debian linux 9.0
    debian debian linux 10.0
    netapp clustered data ontap -
    netapp solidfire -
    netapp hci management node -
    netapp hci bootstrap os -
    netapp hci compute node -
    netapp hci storage node firmware -
    netapp hci storage node -
    apple mac os x *
    apple mac os x *
    apple mac os x 10.14.6 security_update_2020-001
    apple mac os x 10.14.6 security_update_2020-002
    apple mac os x 10.14.6 security_update_2020-003
    apple mac os x 10.14.6 security_update_2020-004
    apple mac os x 10.14.6 security_update_2020-005
    apple mac os x 10.14.6 security_update_2020-006
    apple mac os x 10.14.6 -
    apple mac os x 10.15.7 supplemental_update
    apple mac os x 10.14.6 security_update_2019-001
    apple mac os x 10.14.6 security_update_2019-002
    apple mac os x 10.14.6 security_update_2020-007
    apple mac os x 10.14.6 security_update_2021-001
    apple mac os x 10.15.7 -
    apple mac os x 10.15.7 security_update_2020-001
    apple mac os x 10.15.7 security_update_2021-001
    apple macos *
    siemens simatic tim 1531 irc firmware *
    siemens simatic tim 1531 irc -
    siemens sinec infrastructure network services *
    oracle peoplesoft enterprise peopletools 8.58
    oracle communications billing and revenue management 12.0.0.3.0
    oracle essbase 21.2
    oracle communications cloud native core policy 1.14.0
    ibm qradar security information and event manager 7.3
    ibm cloud private 3.2.1 cd
    ibm qradar security information and event manager 7.4 -
    ibm cloud private 3.2.2 cd
    ibm aspera high-speed transfer server 4.0.0
    ibm cloud pak for security 1.7.0.0
    ibm cloud pak for security 1.7.1.0
    ibm cloud pak for security 1.7.2.0