Loading HuntDB...

CVE-2025-5025

UNKNOWN
Published 2025-05-28T06:29:51.915Z
Actions:

CVSS Score

V3.1
4.8
/10
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
Base Score Metrics
Exploitability: N/A Impact: N/A

Attack Vector Metrics

Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED

Impact Metrics

Confidentiality
LOW
Integrity
LOW
Availability
NONE

Description

libcurl supports *pinning* of the server certificate public key for HTTPS transfers. Due to an omission, this check is not performed when connecting with QUIC for HTTP/3, when the TLS backend is wolfSSL. Documentation says the option works with wolfSSL, failing to specify that it does not for QUIC and HTTP/3. Since pinning makes the transfer succeed if the pin is fine, users could unwittingly connect to an impostor server without noticing.

Available Exploits

No exploits available for this CVE.

Related News

[SECURITY ADVISORY] curl: No QUIC certificate pinning with wolfSSL

Posted by Daniel Stenberg on May 27No QUIC certificate pinning with wolfSSL ======================================== Project curl Security Advisory, May 28 2025 - [Permalink](https://curl.se/docs/CVE-2025-5025.html) VULNERABILITY ------------- libcurl supp…

Seclists.org 2025-05-28 05:54

Affected Products

References

Published: 2025-05-28T06:29:51.915Z
Last Modified: 2025-05-30T16:19:53.775Z
Copied to clipboard!