The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2021-22890

CVE-2021-22890: Haxx Libcurl Auth Bypass Vulnerability

CVE-2021-22890 is an auth bypass vulnerability in Haxx Libcurl affecting versions 7.63.0 to 7.75.0. A malicious HTTPS proxy can exploit TLS 1.3 session ticket handling to perform MITM attacks. This article covers technical details, affected versions, impact, and mitigation steps.

Published: March 4, 2026

CVE-2021-22890 Overview

CVE-2021-22890 is a Man-in-the-Middle (MITM) vulnerability affecting curl versions 7.63.0 through 7.75.0. The vulnerability exists in how libcurl handles TLS 1.3 session tickets when connecting through an HTTPS proxy. A malicious HTTPS proxy can exploit this flaw to intercept and potentially modify communications between the client and the intended server without detection.

When using a HTTPS proxy with TLS 1.3, libcurl can confuse session tickets arriving from the HTTPS proxy, treating them as if they arrived from the remote server. This confusion allows the proxy to trick libcurl into using the wrong session ticket for host resumption, thereby circumventing the server TLS certificate check and enabling an unnoticed MITM attack.

Critical Impact

A malicious HTTPS proxy can perform undetected MITM attacks by exploiting TLS 1.3 session ticket confusion, potentially compromising data integrity in transit.

Affected Products

  • Haxx libcurl (versions 7.63.0 to 7.75.0)
  • Fedora 32, 33, and 34
  • NetApp HCI Management Node
  • NetApp SolidFire
  • NetApp HCI Storage Node
  • Broadcom Fabric Operating System
  • Debian Linux 9.0
  • Siemens SINEC Infrastructure Network Services
  • Oracle Communications Billing and Revenue Management 12.0.0.3.0
  • Oracle Essbase 21.2
  • Splunk Universal Forwarder

Discovery Timeline

  • 2021-04-01 - CVE-2021-22890 published to NVD
  • 2025-06-09 - Last updated in NVD database

Technical Details for CVE-2021-22890

Vulnerability Analysis

This vulnerability is classified under CWE-300 (Channel Accessible by Non-Endpoint) and CWE-290 (Authentication Bypass by Spoofing). The core issue lies in the improper handling of TLS 1.3 session tickets within libcurl when connections traverse an HTTPS proxy.

TLS 1.3 introduced session tickets as a mechanism for faster session resumption, allowing clients to skip the full handshake process on subsequent connections. However, libcurl's implementation failed to properly differentiate between session tickets originating from the HTTPS proxy and those from the target server.

The attack requires specific conditions: the victim must connect through a malicious HTTPS proxy while using TLS 1.3. The proxy must also possess a certificate that curl will accept for the target server (or curl must be configured to ignore certificate validation). Under these conditions, the proxy can inject its own session tickets and have libcurl incorrectly resume sessions with the proxy instead of the legitimate server.

Root Cause

The root cause is improper session ticket validation in libcurl's TLS 1.3 implementation. The library failed to maintain proper session ticket origin tracking when operating through an HTTPS proxy, allowing tickets from the proxy to be misattributed to the destination server. This design flaw permits session ticket confusion, where libcurl uses proxy-provided tickets for host handshakes.

Attack Vector

The attack requires a network position as a malicious HTTPS proxy between the victim client and the target server. The attack flow proceeds as follows:

  1. The victim client connects to an HTTPS proxy controlled by the attacker
  2. The malicious proxy establishes a TLS 1.3 connection with the client
  3. The proxy sends TLS 1.3 session tickets to the client
  4. Due to the vulnerability, libcurl confuses these proxy tickets as belonging to the target server
  5. On subsequent connections, libcurl attempts to resume the session using the wrong tickets
  6. This bypasses the server's TLS certificate validation, allowing the proxy to intercept traffic

The attack complexity is considered high as it requires the attacker to control an HTTPS proxy in the communication path and possess an acceptable certificate for the target server.

Detection Methods for CVE-2021-22890

Indicators of Compromise

  • Unexpected TLS session resumption failures followed by successful connections through HTTPS proxies
  • Certificate chain anomalies where the proxy certificate is used instead of the expected server certificate
  • TLS handshake patterns showing session ticket reuse across different target servers

Detection Strategies

  • Monitor for curl/libcurl version usage across systems and flag versions between 7.63.0 and 7.75.0
  • Implement TLS inspection to identify mismatched session ticket origins and destinations
  • Deploy network monitoring to detect unusual proxy behavior or certificate substitutions

Monitoring Recommendations

  • Audit all systems for vulnerable curl/libcurl versions using software composition analysis tools
  • Monitor TLS connection logs for abnormal session resumption patterns through HTTPS proxies
  • Implement certificate pinning where possible to detect certificate substitution attacks

How to Mitigate CVE-2021-22890

Immediate Actions Required

  • Upgrade curl to version 7.76.0 or later, which contains the fix for this vulnerability
  • Audit systems for applications embedding vulnerable libcurl versions and update accordingly
  • Avoid using untrusted HTTPS proxies until systems are patched
  • Consider disabling TLS 1.3 session tickets as a temporary workaround if upgrading is not immediately possible

Patch Information

The vulnerability has been addressed in curl version 7.76.0 and later. Multiple vendors have released security advisories and patches for their affected products:

  • cURL Official CVE-2021-22890 Advisory - Official curl project documentation
  • Siemens Security Advisory SSA-389290 - Siemens product updates
  • NetApp Security Advisory NTAP-20210521-0007 - NetApp product patches
  • Oracle CPU July 2021 Alert - Oracle product updates
  • Gentoo GLSA 2021-05-36 - Gentoo Linux security update

Workarounds

  • Disable TLS 1.3 and fall back to TLS 1.2 when connecting through HTTPS proxies
  • Avoid using HTTPS proxies from untrusted sources until systems are patched
  • Enable strict certificate validation and consider certificate pinning for critical connections
  • Monitor and restrict proxy usage in enterprise environments to trusted, vetted proxies only
bash
# Example: Force TLS 1.2 maximum version as a workaround
curl --tlsv1.2 --tls-max 1.2 --proxy https://proxy:port https://target-server.com

# Example: Check curl version to verify if vulnerable
curl --version | grep -E "^curl [0-9]"
# Versions 7.63.0 through 7.75.0 are vulnerable

# Example: Update curl on Debian/Ubuntu systems
sudo apt update && sudo apt install --only-upgrade curl libcurl4

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechLibcurl

  • SeverityLOW

  • CVSS Score3.7

  • EPSS Probability0.15%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-300

  • CWE-290
  • Technical References
  • Fedora Package Announcement #1

  • Fedora Package Announcement #2

  • Fedora Package Announcement #3

  • Gentoo GLSA 2021-05-36

  • NetApp Security Advisory NTAP-20210521-0007

  • Oracle CPU July 2021 Alert
  • Vendor Resources
  • Siemens Security Advisory SSA-389290

  • cURL CVE-2021-22890 Details

  • HackerOne Report #1129529
  • Related CVEs
  • CVE-2023-27538: Haxx Libcurl Auth Bypass Vulnerability

  • CVE-2023-27535: Haxx Libcurl Auth Bypass Vulnerability

  • CVE-2023-27536: Haxx Libcurl Auth Bypass Vulnerability

  • CVE-2026-22026: CryptoLib KMC Client DoS Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English