Análise pendenteCVE-2026-4873

CVE-2026-4873: TLS Bypass in curl 8.12.0–8.19.0

Plataforma

curl

Componente

curl

Corrigido em

8.19.1

CVE-2026-4873 describes a TLS bypass vulnerability discovered in curl versions 8.12.0 through 8.19.0. This flaw allows attackers to potentially bypass TLS encryption and transmit data in cleartext, compromising the confidentiality of sensitive information. The vulnerability stems from incorrect connection reuse within the connection pool. Affected users should upgrade to version 8.19.1 to mitigate this risk.

Impacto e Cenários de Ataquetraduzindo…

The primary impact of CVE-2026-4873 is the potential for unencrypted data transmission. An attacker who can control the initial connection to a server (e.g., via an IMAP, SMTP, or POP3 transfer) can then trigger a subsequent request to the same host. Because of the flawed connection pool management, this subsequent request will bypass TLS entirely, sending data unencrypted. This could expose sensitive credentials, personal information, or other confidential data. The blast radius is significant for any system using curl to communicate with servers using these protocols, particularly in automated workflows or scripting environments where connection reuse is common. The risk is amplified in environments where curl is used to access sensitive services like email servers or web APIs.

Contexto de Exploraçãotraduzindo…

CVE-2026-4873 was published on May 13, 2026. Its exploitation context is currently unclear, with no known active campaigns or public proof-of-concept exploits. The vulnerability is not listed on KEV (Kernel Exploit Vulnerability) or EPSS (Exploit Prediction Scoring System). The CVSS score is pending evaluation. Monitor security advisories and threat intelligence feeds for any updates regarding exploitation attempts.

Software Afetado

Componentecurl
Fornecedorcurl
Versão mínima8.12.0
Versão máxima8.19.0
Corrigido em8.19.1

Classificação de Fraqueza (CWE)

Linha do tempo

  1. Reserved
  2. Publicada

Mitigação e Soluções Alternativastraduzindo…

The definitive mitigation for CVE-2026-4873 is to upgrade to curl version 8.19.1 or later. If upgrading is not immediately feasible, consider implementing temporary workarounds. Disabling connection reuse within curl configurations (if possible) can reduce the attack surface, although this may impact performance. Network-level firewalls and intrusion detection systems (IDS) can be configured to monitor for unusual traffic patterns, such as cleartext communication over ports typically used for TLS-encrypted connections. Review curl configurations and scripts to identify instances where connection reuse is enabled and assess the potential risk. After upgrading, verify the fix by initiating a cleartext connection followed by a TLS connection to the same host and confirming that the second connection is indeed encrypted.

Como corrigirtraduzindo…

Actualice a la versión 8.19.1 o superior de curl para evitar la reutilización incorrecta de conexiones que ignora los requisitos de TLS. Esto asegura que las comunicaciones se cifren adecuadamente, protegiendo la confidencialidad de los datos transmitidos.

Perguntas frequentestraduzindo…

What is CVE-2026-4873 — TLS Bypass in curl?

CVE-2026-4873 is a vulnerability in curl versions 8.12.0 through 8.19.0 that allows attackers to bypass TLS encryption and transmit data unencrypted by reusing existing connections. This can expose sensitive information.

Am I affected by CVE-2026-4873 in curl?

If you are using curl versions 8.12.0 through 8.19.0, you are potentially affected by CVE-2026-4873. Check your curl version using curl --version and upgrade if necessary.

How do I fix CVE-2026-4873 in curl?

The recommended fix is to upgrade to curl version 8.19.1 or later. If immediate upgrade is not possible, consider temporary workarounds like disabling connection reuse.

Is CVE-2026-4873 being actively exploited?

As of the current assessment, CVE-2026-4873 is not known to be actively exploited. However, it's crucial to apply the patch or implement mitigations proactively.

Where can I find the official curl advisory for CVE-2026-4873?

Refer to the official curl security announcements and advisories on the curl project website for the latest information regarding CVE-2026-4873: https://curl.se/security/

Seu projeto está afetado?

Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.

ao vivoverificação gratuita

Experimente agora — sem conta

Faça upload de qualquer manifesto (composer.lock, package-lock.json, lista de plugins WordPress…) ou cole sua lista de componentes. Receba um relatório de vulnerabilidades instantaneamente. Fazer upload de um arquivo é só o começo: com uma conta, você obtém monitoramento contínuo, alertas por Slack/email, relatórios multiprojeto e white-label.

Escaneamento manualAlertas por Slack/e-mailMonitoramento ContínuoRelatórios de marca branca

Arraste e solte seu arquivo de dependências

composer.lock, package-lock.json, requirements.txt, Gemfile.lock, pubspec.lock, Dockerfile...