CVE-2021-22946

high Splunk
CVSS v3 Base Score
7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score
0.1%
Exploitation probability in 30 days
Top 77% most likely to be exploited
Attack Characteristics
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Confidentiality
High
Integrity
None
Availability
None
Published: September 29, 2021 (1688 days ago)
Last Modified: April 16, 2026
Vendor: Splunk
Source: NVD

Description

A user can tell curl >= 7.20.0 and <= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server (`--ssl-reqd` on the command line or`CURLOPT_USE_SSL` set to `CURLUSESSL_CONTROL` or `CURLUSESSL_ALL` withlibcurl). This requirement could be bypassed if the server would return a properly crafted but perfectly legitimate response.This flaw would then make curl silently continue its operations **withoutTLS** contrary to the instructions and expectations, exposing possibly sensitive data in clear text over the network.

CWE

CWE-325

Affected Products

haxx curldebian debian linuxfedoraproject fedoranetapp cloud backupnetapp clustered data ontapnetapp oncommand insightnetapp oncommand workflow automationnetapp snapcenternetapp h300s firmwarenetapp h500s firmware

References