Vulnerability in curl library

Advisory ID CVE Number Date discovered Severity Advisory revision
STORM-2026-010 CVE-2025-9086 09/10/2025 low v2

Vulnerability details

A vulnerability in libcurl can cause an out-of-bounds read or a service crash.

Impacted products

ProductsSeverityDetail
Stormshield Network Security low SNS is impacted.

Revisions

Version Date Description
v1 05/21/2026 Initial release
v2 05/21/2026 Published as disclosed


Stormshield Network Security

CVSS v3.1 Overall Score: 2.7      

Analysis

Impacted version

A vulnerability in libcurl can cause an out-of-bounds read or a service crash.

CVE-2025-9086 is an out‑of‑bounds memory read in libcurl, occurring in a specific case of handling secure cookies after an HTTPS → HTTP transition.

The SNS appliance does not launch curl requests by itself, and the vulnerability is only exploitable if a request is launched from the admin console to a compromised server.

The primary impact is an application crash (DoS) in certain fragile cases, it can also allow a MITM/HTTP context to replace a secure cookie, thereby disrupting the session or the expected level of trust.

 

  • SNS 5.0.0 to 5.0.5
  • SNS 4.4.0 to 4.8.15
  • SNS 4.3.0 to 4.3.42

Workaround solution

Solution

There is no workaround solution.

The following updates will fix this vulnerability:

  • SNS 5.0.6
  • SNS 4.8.16
  • SNS 4.3.43


Attack Vector Attack Complexity Privileges Required User Interaction Scope Confidentiality Impact Integrity Impact Availability impact
Network High None Required Unchanged Low None None
CVSS Base score: 3.1 CVSS Vector: (AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N)
Exploit Code Maturity Remediation Level Report Confidence
Unproven that exploit exists Official fix Confirmed
CVSS Temporal score: 2.7 CVSS Vector: (AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
Confidentiality Requirement (CR) Integrity Requirement (IR) Availability Requirement (AR)
Medium Medium Medium
CVSS Environmental score: 2.7 CVSS Vector: (AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C/CR:M/IR:M/AR:M/MAV:X/MAC:X/MPR:X/MUI:X/MS:X/MC:X/MI:X/MA:X)