The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2021-22926

CVE-2021-22926: Haxx Curl Auth Bypass Vulnerability

CVE-2021-22926 is an authentication bypass vulnerability in Haxx Curl that allows attackers to trick applications into using wrong client certificates. This post explains its impact, affected versions, and mitigation steps.

Published: February 25, 2026

CVE-2021-22926 Overview

CVE-2021-22926 is a certificate validation bypass vulnerability affecting libcurl when built with macOS native TLS library Secure Transport. The vulnerability allows an attacker to trick applications into using a malicious file-based client certificate instead of the intended certificate specified by name, potentially causing improper TLS authentication and connection failures.

Applications using libcurl can request a specific client certificate via the CURLOPT_SSLCERT option (or --cert command line flag). When libcurl is compiled to use macOS Secure Transport, it accepts certificate specifications either by name or by file path using the same option. If a file exists with the same name as the requested certificate, libcurl will prioritize the file-based certificate over the named certificate. An attacker with write access to the application's current working directory (such as /tmp) can plant a malicious certificate file, causing the application to send an incorrect client certificate during TLS handshakes.

Critical Impact

Attackers can manipulate TLS client certificate selection, potentially causing authentication failures, denial of service, or connection to unintended servers when applications run from world-writable directories.

Affected Products

  • Haxx curl (versions using macOS Secure Transport)
  • NetApp Active IQ Unified Manager
  • NetApp Clustered Data ONTAP
  • NetApp HCI Management Node
  • NetApp OnCommand Insight
  • NetApp OnCommand Workflow Automation
  • NetApp SnapCenter
  • NetApp SolidFire
  • Oracle MySQL Server
  • Oracle PeopleSoft Enterprise PeopleTools (versions 8.57, 8.58, 8.59)
  • Siemens SINEC Infrastructure Network Services
  • Splunk Universal Forwarder
  • NetApp H-Series Hardware (H300S, H300E, H500E, H500S, H700S, H700E, H410S)

Discovery Timeline

  • 2021-08-05 - CVE-2021-22926 published to NVD
  • 2024-11-21 - Last updated in NVD database

Technical Details for CVE-2021-22926

Vulnerability Analysis

This vulnerability stems from ambiguous certificate identification in libcurl's macOS Secure Transport implementation. When an application specifies a client certificate using CURLOPT_SSLCERT, libcurl must determine whether the provided value represents a certificate name (to be looked up in the macOS Keychain) or a file path. The problematic behavior occurs because libcurl checks for file existence before attempting a name-based lookup.

If an attacker can create a file in the application's current working directory with the same name as the expected certificate, libcurl will load and use the attacker-controlled file certificate instead of the legitimate named certificate from the Keychain. This is particularly dangerous when applications operate from world-writable directories like /tmp, where any local user can create files.

The exploitation scenario requires the attacker to have local write access to a directory where the target application executes curl operations. While this limits the attack surface to local privilege escalation scenarios, multi-user systems and containerized environments may be particularly vulnerable.

Root Cause

The root cause is improper certificate validation logic (CWE-295) combined with business logic errors (CWE-840) in how libcurl resolves certificate specifications. The library fails to clearly distinguish between name-based and file-based certificate references, creating an ambiguity that attackers can exploit. The file existence check takes precedence over Keychain lookups, allowing file-based certificate injection when an attacker can predict the certificate name used by a target application.

Attack Vector

The attack requires local access to the system running the vulnerable application. An attacker must:

  1. Identify an application using libcurl with Secure Transport that specifies client certificates by name
  2. Determine the certificate name being requested by the application
  3. Gain write access to a directory where the target application executes (commonly /tmp or other shared directories)
  4. Create a malicious certificate file with the same name as the expected certificate
  5. Wait for the application to initiate a TLS connection requiring client authentication

The exploitation mechanism leverages the file-over-name resolution priority:

When libcurl processes the CURLOPT_SSLCERT option on macOS Secure Transport builds, it first checks whether a file with the specified name exists in the current working directory. If found, the file is loaded as a certificate regardless of whether the application developer intended to reference a Keychain-stored certificate. This creates a Time-of-Check Time-of-Use (TOCTOU) race condition where the certificate resolution can be manipulated between application configuration and actual TLS connection establishment.

Detection Methods for CVE-2021-22926

Indicators of Compromise

  • Unexpected certificate files appearing in application working directories, particularly /tmp
  • TLS handshake failures in applications that previously worked correctly
  • Log entries indicating certificate mismatch or authentication failures during client certificate authentication
  • Suspicious file creation activity in directories used by curl-based applications

Detection Strategies

  • Monitor file creation events in world-writable directories, particularly for files with certificate-like names or extensions
  • Implement application-level logging of certificate selection to detect when file-based certificates are loaded unexpectedly
  • Use file integrity monitoring on directories where applications execute curl operations
  • Audit applications running from /tmp or other shared directories that use client certificate authentication

Monitoring Recommendations

  • Deploy endpoint detection rules to alert on suspicious file operations in directories like /tmp from non-administrative users
  • Configure SentinelOne to monitor for anomalous TLS connection patterns that may indicate certificate substitution attacks
  • Implement centralized logging for TLS authentication events across systems using affected libcurl versions
  • Review application configurations to identify those using CURLOPT_SSLCERT with Secure Transport on macOS

How to Mitigate CVE-2021-22926

Immediate Actions Required

  • Update curl and libcurl to the latest patched version addressing CVE-2021-22926
  • Audit applications to identify those running from world-writable directories with client certificate requirements
  • Configure applications to run from directories with restricted write permissions
  • Review and apply vendor patches from Oracle, NetApp, Siemens, and Splunk for affected products

Patch Information

Multiple vendors have released security advisories and patches addressing this vulnerability:

  • Oracle Security Alert October 2021 - Addresses MySQL Server and PeopleSoft Enterprise PeopleTools
  • Oracle Security Alert January 2022 - Additional Oracle product updates
  • NetApp Security Advisory NTAP-20210902-0003 - NetApp product updates
  • Siemens Security Advisory SSA-389290 - SINEC Infrastructure Network Services patch
  • Gentoo GLSA 202212-01 - Gentoo Linux package updates

Organizations should prioritize updating curl/libcurl libraries across all affected systems and dependencies.

Workarounds

  • Avoid running applications that use libcurl client certificates from world-writable directories
  • Use absolute file paths for certificate specifications rather than certificate names when possible
  • Implement strict directory permissions to prevent unauthorized file creation in application working directories
  • Consider using alternative TLS backends for libcurl where client certificate confusion is not possible
  • Set restrictive umask values and directory permissions for applications requiring client certificate authentication
bash
# Restrict application working directory permissions
chmod 755 /path/to/app/workdir
chown root:root /path/to/app/workdir

# Verify curl version and TLS backend
curl --version | grep -i "ssl\|tls"

# Check for affected libcurl configuration
ldd $(which curl) | grep -i ssl

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechHaxx Curl

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability0.66%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-840

  • CWE-295
  • Technical References
  • HackerOne Report #1234760

  • Apache Kafka Dev Mailing List Thread

  • Apache Kafka Users Mailing List Thread

  • Apache Kafka Dev Mailing List Thread Discussion

  • Apache Kafka Users Mailing List Discussion

  • Gentoo GLSA 202212-01

  • NetApp Security Advisory NTAP-20210902-0003

  • NetApp Security Advisory NTAP-20211022-0003
  • Vendor Resources
  • Siemens Security Advisory SSA-389290

  • Oracle Security Alert January 2022

  • Oracle Security Alert October 2021
  • Related CVEs
  • CVE-2026-1965: Haxx Curl Auth Bypass Vulnerability

  • CVE-2026-3784: Haxx Curl Auth Bypass Vulnerability

  • CVE-2024-0853: Haxx Curl Auth Bypass Vulnerability

  • CVE-2022-43551: Haxx Curl Auth Bypass Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English