Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-10966

Опубликовано: 07 нояб. 2025
Источник: debian
EPSS Низкий

Описание

curl's code for managing SSH connections when SFTP was done using the wolfSSH powered backend was flawed and missed host verification mechanisms. This prevents curl from detecting MITM attackers and more.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
curlfixed8.17.0~rc2-1package

Примечания

  • https://curl.se/docs/CVE-2025-10966.html

  • Introduced with: https://github.com/curl/curl/commit/6773c7ca65cf2183295e56603f9b86a5ce816a06 (curl-7_69_0)

  • Fixed by: https://github.com/curl/curl/commit/b011e3fcfb06d6c0278595ee2ee297036fbe9793 (rc-8_17_0-1)

  • wolfSSH backend not used in Debian

EPSS

Процентиль: 5%
0.0002
Низкий

Связанные уязвимости

CVSS3: 4.3
ubuntu
5 месяцев назад

curl's code for managing SSH connections when SFTP was done using the wolfSSH powered backend was flawed and missed host verification mechanisms. This prevents curl from detecting MITM attackers and more.

CVSS3: 5.9
redhat
5 месяцев назад

curl's code for managing SSH connections when SFTP was done using the wolfSSH powered backend was flawed and missed host verification mechanisms. This prevents curl from detecting MITM attackers and more.

CVSS3: 4.3
nvd
5 месяцев назад

curl's code for managing SSH connections when SFTP was done using the wolfSSH powered backend was flawed and missed host verification mechanisms. This prevents curl from detecting MITM attackers and more.

CVSS3: 6.8
msrc
4 месяца назад

missing SFTP host verification with wolfSSH

CVSS3: 4.3
github
5 месяцев назад

curl's code for managing SSH connections when SFTP was done using the wolfSSH powered backend was flawed and missed host verification mechanisms. This prevents curl from detecting MITM attackers and more.

EPSS

Процентиль: 5%
0.0002
Низкий