The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2021-22946

CVE-2021-22946: Haxx Curl Auth Bypass Vulnerability

CVE-2021-22946 is an auth bypass vulnerability in Haxx Curl that allows servers to bypass TLS requirements, exposing data in clear text. This post covers the technical details, affected versions, impact, and mitigation.

Published: February 25, 2026

CVE-2021-22946 Overview

CVE-2021-22946 is a TLS bypass vulnerability affecting curl versions 7.20.0 through 7.78.0. When users configure curl to require TLS encryption for IMAP, POP3, or FTP connections using the --ssl-reqd command line option or the CURLOPT_USE_SSL libcurl option set to CURLUSESSL_CONTROL or CURLUSESSL_ALL, a malicious server can craft a legitimate-appearing response that bypasses the TLS upgrade requirement. This causes curl to silently continue operations without TLS encryption, potentially exposing sensitive data in clear text over the network.

Critical Impact

This vulnerability allows attackers to bypass mandatory TLS encryption, enabling network traffic interception and exposure of sensitive credentials, emails, and data transmitted via IMAP, POP3, or FTP protocols.

Affected Products

  • Haxx curl (versions 7.20.0 through 7.78.0)
  • Debian Linux (versions 9.0, 10.0, 11.0)
  • Fedora (versions 33, 35)
  • NetApp Cloud Backup, Clustered Data ONTAP, OnCommand Insight, OnCommand Workflow Automation, SnapCenter
  • NetApp H-Series firmware and hardware (H300S, H500S, H700S, H300E, H500E, H700E, H410S)
  • Oracle MySQL Server, PeopleSoft Enterprise PeopleTools, Communications Cloud Native Core products
  • Apple macOS
  • Siemens SINEC Infrastructure Network Services
  • Splunk Universal Forwarder

Discovery Timeline

  • 2021-09-29 - CVE-2021-22946 published to NVD
  • 2024-11-21 - Last updated in NVD database

Technical Details for CVE-2021-22946

Vulnerability Analysis

This vulnerability exists in curl's STARTTLS negotiation logic for mail and file transfer protocols. When a user explicitly requests TLS encryption via --ssl-reqd or the equivalent libcurl options, curl initiates a STARTTLS handshake with the server. The flaw lies in how curl processes the server's response to this upgrade request.

A malicious or compromised server can return a carefully crafted response that appears legitimate but causes curl to skip the TLS upgrade process entirely. Despite the user's explicit requirement for encrypted communications, curl proceeds with the connection in plain text without generating any error or warning. This silent failure mode is particularly dangerous because users have no indication that their security expectations are not being met.

The impact is significant for confidentiality: any data transmitted after the failed TLS upgrade—including authentication credentials, email content, or transferred files—is sent in clear text and can be intercepted by network-based attackers through man-in-the-middle positioning.

Root Cause

The root cause is improper validation of server responses during the STARTTLS negotiation phase (CWE-325: Missing Required Cryptographic Step, CWE-319: Cleartext Transmission of Sensitive Information). The curl library fails to properly enforce the TLS requirement when the server provides a response that, while technically valid according to the protocol, does not actually establish encrypted communications. The logic error allows the connection to proceed without verifying that TLS encryption has been successfully negotiated.

Attack Vector

The attack requires network positioning to act as or compromise a mail or FTP server that the victim's curl client connects to. The attack flow proceeds as follows:

  1. An attacker controls or compromises a server that the victim connects to via IMAP, POP3, or FTP
  2. The victim initiates a connection with --ssl-reqd or equivalent libcurl option enabled
  3. When curl sends the STARTTLS command, the malicious server responds with a crafted legitimate response
  4. curl incorrectly interprets the response as successful and proceeds without TLS
  5. All subsequent communication occurs in clear text, allowing the attacker to capture sensitive data

This attack is particularly effective in scenarios where users connect to mail servers over untrusted networks, as the attacker can intercept email credentials and message contents.

Detection Methods for CVE-2021-22946

Indicators of Compromise

  • Unencrypted IMAP (port 143), POP3 (port 110), or FTP (port 21) traffic where TLS was expected
  • Network traffic analysis showing STARTTLS commands followed by plain text data transmission
  • Curl error logs or verbose output showing unexpected connection states
  • Authentication failures or credential theft incidents following network-based attacks

Detection Strategies

  • Monitor network traffic for IMAP, POP3, and FTP connections that begin with STARTTLS negotiation but continue with unencrypted data
  • Implement deep packet inspection to detect the anomalous server responses that trigger this bypass
  • Review system inventories for curl versions between 7.20.0 and 7.78.0 across all systems
  • Audit application configurations using libcurl with CURLOPT_USE_SSL settings

Monitoring Recommendations

  • Enable verbose logging in curl deployments to capture TLS negotiation details
  • Deploy network monitoring to detect unexpected clear text mail or FTP traffic on internal networks
  • Configure alerts for curl version detection during software asset scans
  • Monitor for credential compromise attempts that may indicate previous exploitation

How to Mitigate CVE-2021-22946

Immediate Actions Required

  • Upgrade curl to version 7.79.0 or later immediately across all affected systems
  • Audit all applications and scripts using libcurl for vulnerable versions
  • Review network configurations to identify systems using IMAP, POP3, or FTP with curl
  • Consider rotating credentials that may have been transmitted over affected connections

Patch Information

The vulnerability was fixed in curl version 7.79.0. Multiple vendors have released patches for their products incorporating the fixed curl version. Organizations should consult the following security advisories for vendor-specific patch information:

  • Oracle Security Alert CPU October 2021
  • Oracle Security Alert CPU January 2022
  • Oracle Security Alert CPU April 2022
  • Oracle Security Alert CPU July 2022
  • Siemens Security Advisory SSA-389290
  • NetApp Advisory NTAP-20211029-0003
  • Apple Support Article HT213183
  • Debian Security Advisory DSA-5197

Workarounds

  • If upgrading is not immediately possible, avoid using curl for IMAP, POP3, or FTP connections over untrusted networks
  • Use alternative transport mechanisms with explicit TLS port connections (IMAPS port 993, POP3S port 995, FTPS port 990) rather than STARTTLS
  • Implement network-level encryption (VPN) as an additional layer when curl must be used with vulnerable versions
  • Monitor network traffic for connections to mail and FTP services to detect potential exploitation attempts
bash
# Check installed curl version
curl --version

# Upgrade curl on Debian/Ubuntu
sudo apt update && sudo apt install curl

# Upgrade curl on RHEL/CentOS/Fedora
sudo dnf update curl

# Verify TLS is working after upgrade (verbose output)
curl -v --ssl-reqd imaps://mail.example.com/

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechHaxx Curl

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability0.07%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-325

  • CWE-319
  • Technical References
  • Full Disclosure Mailing List

  • Debian LTS Announce September 2021

  • Debian LTS Announce August 2022

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Gentoo GLSA 2022-12-01

  • NetApp Advisory NTAP-20211029-0003

  • NetApp Advisory NTAP-20220121-0008

  • Apple Support Article HT213183

  • Debian Security Advisory DSA-5197

  • Oracle Security Alert CPU January 2022
  • Vendor Resources
  • Siemens Security Advisory SSA-389290

  • HackerOne Report #1334111

  • Oracle Security Alert CPU April 2022

  • Oracle Security Alert CPU July 2022

  • Oracle Security Alert CPU October 2021
  • Related CVEs
  • CVE-2026-1965: Haxx Curl Auth Bypass Vulnerability

  • CVE-2026-3784: Haxx Curl Auth Bypass Vulnerability

  • CVE-2024-0853: Haxx Curl Auth Bypass Vulnerability

  • CVE-2022-43551: Haxx Curl Auth Bypass Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English