Analyse en attenteCVE-2026-4873

CVE-2026-4873: TLS Bypass in curl 8.12.0–8.19.0

Plateforme

curl

Composant

curl

Corrigé dans

8.19.1

CVE-2026-4873 describes a TLS bypass vulnerability discovered in curl versions 8.12.0 through 8.19.0. This flaw allows attackers to potentially bypass TLS encryption and transmit data in cleartext, compromising the confidentiality of sensitive information. The vulnerability stems from incorrect connection reuse within the connection pool. Affected users should upgrade to version 8.19.1 to mitigate this risk.

Impact et Scénarios d'Attaquetraduction en cours…

The primary impact of CVE-2026-4873 is the potential for unencrypted data transmission. An attacker who can control the initial connection to a server (e.g., via an IMAP, SMTP, or POP3 transfer) can then trigger a subsequent request to the same host. Because of the flawed connection pool management, this subsequent request will bypass TLS entirely, sending data unencrypted. This could expose sensitive credentials, personal information, or other confidential data. The blast radius is significant for any system using curl to communicate with servers using these protocols, particularly in automated workflows or scripting environments where connection reuse is common. The risk is amplified in environments where curl is used to access sensitive services like email servers or web APIs.

Contexte d'Exploitationtraduction en cours…

CVE-2026-4873 was published on May 13, 2026. Its exploitation context is currently unclear, with no known active campaigns or public proof-of-concept exploits. The vulnerability is not listed on KEV (Kernel Exploit Vulnerability) or EPSS (Exploit Prediction Scoring System). The CVSS score is pending evaluation. Monitor security advisories and threat intelligence feeds for any updates regarding exploitation attempts.

Logiciel Affecté

Composantcurl
Fournisseurcurl
Version minimale8.12.0
Version maximale8.19.0
Corrigé dans8.19.1

Classification de Faiblesse (CWE)

Chronologie

  1. Reserved
  2. Publiée

Mitigation et Contournementstraduction en cours…

The definitive mitigation for CVE-2026-4873 is to upgrade to curl version 8.19.1 or later. If upgrading is not immediately feasible, consider implementing temporary workarounds. Disabling connection reuse within curl configurations (if possible) can reduce the attack surface, although this may impact performance. Network-level firewalls and intrusion detection systems (IDS) can be configured to monitor for unusual traffic patterns, such as cleartext communication over ports typically used for TLS-encrypted connections. Review curl configurations and scripts to identify instances where connection reuse is enabled and assess the potential risk. After upgrading, verify the fix by initiating a cleartext connection followed by a TLS connection to the same host and confirming that the second connection is indeed encrypted.

Comment corrigertraduction en cours…

Actualice a la versión 8.19.1 o superior de curl para evitar la reutilización incorrecta de conexiones que ignora los requisitos de TLS. Esto asegura que las comunicaciones se cifren adecuadamente, protegiendo la confidencialidad de los datos transmitidos.

Questions fréquentestraduction en cours…

What is CVE-2026-4873 — TLS Bypass in curl?

CVE-2026-4873 is a vulnerability in curl versions 8.12.0 through 8.19.0 that allows attackers to bypass TLS encryption and transmit data unencrypted by reusing existing connections. This can expose sensitive information.

Am I affected by CVE-2026-4873 in curl?

If you are using curl versions 8.12.0 through 8.19.0, you are potentially affected by CVE-2026-4873. Check your curl version using curl --version and upgrade if necessary.

How do I fix CVE-2026-4873 in curl?

The recommended fix is to upgrade to curl version 8.19.1 or later. If immediate upgrade is not possible, consider temporary workarounds like disabling connection reuse.

Is CVE-2026-4873 being actively exploited?

As of the current assessment, CVE-2026-4873 is not known to be actively exploited. However, it's crucial to apply the patch or implement mitigations proactively.

Where can I find the official curl advisory for CVE-2026-4873?

Refer to the official curl security announcements and advisories on the curl project website for the latest information regarding CVE-2026-4873: https://curl.se/security/

Ton projet est-il affecté ?

Téléverse ton fichier de dépendances et découvre instantanément si cette CVE et d'autres te touchent.

en directfree scan

Essayez maintenant — sans compte

scanZone.subtitle

Scan manuelSlack/email alertsContinuous monitoringWhite-label reports

Glissez-déposez votre fichier de dépendances

composer.lock, package-lock.json, requirements.txt, Gemfile.lock, pubspec.lock, Dockerfile...