Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-10966

Опубликовано: 07 нояб. 2025
Источник: debian
EPSS Низкий

Описание

curl's code for managing SSH connections when SFTP was done using the wolfSSH powered backend was flawed and missed host verification mechanisms. This prevents curl from detecting MITM attackers and more.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
curlfixed8.17.0~rc2-1package

Примечания

  • https://curl.se/docs/CVE-2025-10966.html

  • Introduced with: https://github.com/curl/curl/commit/6773c7ca65cf2183295e56603f9b86a5ce816a06 (curl-7_69_0)

  • Fixed by: https://github.com/curl/curl/commit/b011e3fcfb06d6c0278595ee2ee297036fbe9793 (rc-8_17_0-1)

  • wolfSSH backend not used in Debian

EPSS

Процентиль: 11%
0.00039
Низкий

Связанные уязвимости

CVSS3: 4.3
ubuntu
3 месяца назад

curl's code for managing SSH connections when SFTP was done using the wolfSSH powered backend was flawed and missed host verification mechanisms. This prevents curl from detecting MITM attackers and more.

CVSS3: 4.3
nvd
3 месяца назад

curl's code for managing SSH connections when SFTP was done using the wolfSSH powered backend was flawed and missed host verification mechanisms. This prevents curl from detecting MITM attackers and more.

msrc
2 месяца назад

missing SFTP host verification with wolfSSH

CVSS3: 4.3
github
3 месяца назад

curl's code for managing SSH connections when SFTP was done using the wolfSSH powered backend was flawed and missed host verification mechanisms. This prevents curl from detecting MITM attackers and more.

CVSS3: 4.3
fstec
3 месяца назад

Уязвимость программного средства для взаимодействия с серверами cURL, связанная с обменом ключами без аутентификации объекта, позволяющая нарушителю выполнять атаки типа «человек посередине»

EPSS

Процентиль: 11%
0.00039
Низкий