{"api_version":"1","generated_at":"2026-04-22T23:09:15+00:00","cve":"CVE-2022-23491","urls":{"html":"https://cve.report/CVE-2022-23491","api":"https://cve.report/api/cve/CVE-2022-23491.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-23491","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-23491"},"summary":{"title":"CVE-2022-23491","description":"Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi 2022.12.07 removes root certificates from \"TrustCor\" from the root store. These are in the process of being removed from Mozilla's trust store. TrustCor's root certificates are being removed pursuant to an investigation prompted by media reporting that TrustCor's ownership also operated a business that produced spyware. Conclusions of Mozilla's investigation can be found in the linked google group discussion.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2022-12-07 22:15:00","updated_at":"2023-03-24 18:12:00"},"problem_types":["CWE-345"],"metrics":[],"references":[{"url":"https://github.com/certifi/python-certifi/security/advisories/GHSA-43fp-rhv2-5gv8","name":"https://github.com/certifi/python-certifi/security/advisories/GHSA-43fp-rhv2-5gv8","refsource":"MISC","tags":[],"title":"Removal of TrustCor root certificate · Advisory · certifi/python-certifi · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/oxX69KFvsm4/m/yLohoVqtCgAJ","name":"https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/oxX69KFvsm4/m/yLohoVqtCgAJ","refsource":"MISC","tags":[],"title":"concerns about Trustcor","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-23491","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-23491","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"23491","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"certifi_project","cpe5":"certifi","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"23491","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"certifi_project","cpe5":"certifi","cpe6":"2022.12.07","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-23491","qid":"150735","title":"Oracle WebLogic Server Multiple Vulnerabilities (CPU - OCT2023)"},{"cve":"CVE-2022-23491","qid":"199432","title":"Ubuntu Security Notification for Ca-certificates Update (USN-5761-1)"},{"cve":"CVE-2022-23491","qid":"20366","title":"Oracle Database 19c Critical Patch Update - October 2023"},{"cve":"CVE-2022-23491","qid":"20367","title":"Oracle Database 21c Critical Patch Update - October 2023"},{"cve":"CVE-2022-23491","qid":"20368","title":"Oracle Database 19c Critical OJVM Patch Update - October 2023"},{"cve":"CVE-2022-23491","qid":"283832","title":"Fedora Security Update for mingw (FEDORA-2023-7ed04fe4a7)"},{"cve":"CVE-2022-23491","qid":"283833","title":"Fedora Security Update for mingw (FEDORA-2023-ed525aa807)"},{"cve":"CVE-2022-23491","qid":"284233","title":"Fedora Security Update for mingw (FEDORA-2023-bc1545f9bc)"},{"cve":"CVE-2022-23491","qid":"354746","title":"Amazon Linux Security Advisory for ca-certificates : ALAS-2023-1690"},{"cve":"CVE-2022-23491","qid":"354778","title":"Amazon Linux Security Advisory for ca-certificates : ALAS2-2023-1957"},{"cve":"CVE-2022-23491","qid":"355150","title":"Amazon Linux Security Advisory for ca-certificates : ALAS2023-2023-061"},{"cve":"CVE-2022-23491","qid":"355282","title":"Amazon Linux Security Advisory for python-certifi : ALAS2023-2023-062"},{"cve":"CVE-2022-23491","qid":"378599","title":"Splunk Enterprise Third Party Package Updates for June (SVD-2023-0613)"},{"cve":"CVE-2022-23491","qid":"378883","title":"Splunk Enterprise August Third Party Package Updates (SVD-2023-0808)"},{"cve":"CVE-2022-23491","qid":"753542","title":"SUSE Enterprise Linux Security Update for mozilla-nss (SUSE-SU-2023:0119-1)"},{"cve":"CVE-2022-23491","qid":"753547","title":"SUSE Enterprise Linux Security Update for mozilla-nss (SUSE-SU-2023:0118-1)"},{"cve":"CVE-2022-23491","qid":"753559","title":"SUSE Enterprise Linux Security Update for mozilla-nss (SUSE-SU-2023:0130-1)"},{"cve":"CVE-2022-23491","qid":"753561","title":"SUSE Enterprise Linux Security Update for python-certifi (SUSE-SU-2023:0139-1)"},{"cve":"CVE-2022-23491","qid":"87548","title":"Oracle WebLogic Server Multiple Vulnerabilities (CPUOCT2023)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2022-23491","ASSIGNER":"security-advisories@github.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi 2022.12.07 removes root certificates from \"TrustCor\" from the root store. These are in the process of being removed from Mozilla's trust store. TrustCor's root certificates are being removed pursuant to an investigation prompted by media reporting that TrustCor's ownership also operated a business that produced spyware. Conclusions of Mozilla's investigation can be found in the linked google group discussion."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-345: Insufficient Verification of Data Authenticity","cweId":"CWE-345"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"certifi","product":{"product_data":[{"product_name":"python-certifi","version":{"version_data":[{"version_value":"< 2022.12.07","version_affected":"="}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/certifi/python-certifi/security/advisories/GHSA-43fp-rhv2-5gv8","refsource":"MISC","name":"https://github.com/certifi/python-certifi/security/advisories/GHSA-43fp-rhv2-5gv8"},{"url":"https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/oxX69KFvsm4/m/yLohoVqtCgAJ","refsource":"MISC","name":"https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/oxX69KFvsm4/m/yLohoVqtCgAJ"}]},"source":{"advisory":"GHSA-43fp-rhv2-5gv8","discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.8,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N","version":"3.1"}]}},"nvd":{"publishedDate":"2022-12-07 22:15:00","lastModifiedDate":"2023-03-24 18:12:00","problem_types":["CWE-345"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:certifi_project:certifi:*:*:*:*:*:*:*:*","versionStartIncluding":"2017.11.5","versionEndExcluding":"2022.12.7","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2022","CveId":"23491","Ordinal":"226380","Title":"CVE-2022-23491","CVE":"CVE-2022-23491","Year":"2022"},"notes":[{"CveYear":"2022","CveId":"23491","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}