From this article, it doesn't sound like most people would be affected by this vulnerability which is most likely why Apple is not patching it on older versions of macOS:
https://www.intruder.io/blog/curl-high-rated-cve-2023-38545
Does not seem like there is any reason for concern unless you have a system configuration using SOCKS5 proxy.
FYI, just because there is a high vulnerability issue....it does not mean every system is affected by the issue. Of course if it is possible to update it, then you should, but in this case you cannot do so. Even if you were to install a third party version, it still won't help with the macOS built-in version which will still exist and which apps could still access. Again, there is nothing for you to do except although the article I linked did mention a buffer size setting which may prevent the vulnerability. Those 2017 models are now on hardware life support anyway, so it won't be long before repairs are no longer possible and Ventura will no longer be supported by the end of 2025 with many third party apps also not allowing for new updates to their apps after that time either.
Your choice is to only run the absolute latest version of macOS released every year, or to live with the various unpatched vulnerabilities found in every older OS....even if it is only several months now in low priority mode. It is a balancing act IT admins must balance based on their business needs and use. This is what buying into the Apple ecosystem involves....if it is unacceptable, then you need to look at other ecosystems and operating systems.