curl / Docs / curl CVEs / QUIC certificate check bypass with wolfSSL
Awarded 540 USD


QUIC certificate check bypass with wolfSSL

Project curl Security Advisory, March 27 2024 - Permalink


libcurl skips the certificate verification for a QUIC connection under certain conditions, when built to use wolfSSL. If told to use an unknown/bad cipher or curve, the error path accidentally skips the verification and returns OK, thus ignoring any certificate problems.


To trigger, this issue also requires that the used wolfSSL library was built with the OPENSSL_COMPATIBLE_DEFAULTS symbol set, which is not set for the recommended configure --enable-curl builds.

The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2024-2379 to this issue.

CWE-295: Improper Certificate Validation

Severity: Low


libcurl is used by many applications, but not always advertised as such!

This flaw is also accessible using the curl command line tool.


Starting in curl 8.7.0, this mistake is fixed.


A - Upgrade curl to version 8.7.0

B - Apply the patch to your local version

C - Avoid using HTTP/3 with curl built to use wolfSSL


This issue was reported to the curl project on March 10, 2024. We contacted distros@openwall on March 19, 2024.

curl 8.7.0 was released on March 27 2024 around 07:00 UTC, coordinated with the publication of this advisory.

The curl security team is not aware of any active exploits using this vulnerability.


Thanks a lot!