Lucene search

K
cve[email protected]CVE-2023-40012
HistoryAug 09, 2023 - 4:15 p.m.

CVE-2023-40012

2023-08-0916:15:10
CWE-347
CWE-325
web.nvd.nist.gov
10
uthenticode
library
vulnerability
certificate
validation
cve-2023-40012

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

0.001 Low

EPSS

Percentile

22.1%

uthenticode is a small cross-platform library for partially verifying Authenticode digital signatures. Versions of uthenticode prior to the 2.x series did not check Extended Key Usages in certificates, in violation of the Authenticode X.509 certificate profile. As a result, a malicious user could produce a “signed” PE file that uthenticode would verify and consider valid using an X.509 certificate that isn’t entitled to produce code signatures (e.g., a SSL certificate). By design, uthenticode does not perform full-chain validation. However, the absence of EKU validation was an unintended oversight. The 2.0.0 release series includes EKU checks. There are no workarounds to this vulnerability.

Affected configurations

Vulners
NVD
Node
trailofbitsuthenticodeRange<2.0.0
VendorProductVersionCPE
trailofbitsuthenticode*cpe:2.3:a:trailofbits:uthenticode:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "trailofbits",
    "product": "uthenticode",
    "versions": [
      {
        "version": "< 2.0.0",
        "status": "affected"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

0.001 Low

EPSS

Percentile

22.1%

Related for CVE-2023-40012