{"api_version":"1","generated_at":"2026-04-08T22:43:31+00:00","cve":"CVE-2023-40012","urls":{"html":"https://cve.report/CVE-2023-40012","api":"https://cve.report/api/cve/CVE-2023-40012.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-40012","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-40012"},"summary":{"title":"CVE-2023-40012","description":"uthenticode is a small cross-platform library for partially verifying Authenticode digital signatures. Versions of uthenticode prior to the 2.x series did not check Extended Key Usages in certificates, in violation of the Authenticode X.509 certificate profile. As a result, a malicious user could produce a \"signed\" PE file that uthenticode would verify and consider valid using an X.509 certificate that isn't entitled to produce code signatures (e.g., a SSL certificate). By design, uthenticode does not perform full-chain validation. However, the absence of EKU validation was an unintended oversight. The 2.0.0 release series includes EKU checks. There are no workarounds to this vulnerability.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2023-08-09 16:15:00","updated_at":"2023-08-16 17:40:00"},"problem_types":["CWE-347"],"metrics":[],"references":[{"url":"https://github.com/trailofbits/uthenticode/security/advisories/GHSA-gm2f-j4rj-6xqj","name":"https://github.com/trailofbits/uthenticode/security/advisories/GHSA-gm2f-j4rj-6xqj","refsource":"MISC","tags":[],"title":"EKU validation bypass in uthenticode · Advisory · trailofbits/uthenticode · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/trailofbits/uthenticode/pull/78","name":"https://github.com/trailofbits/uthenticode/pull/78","refsource":"MISC","tags":[],"title":"src: bump OpenSSL, EKU check by woodruffw · Pull Request #78 · trailofbits/uthenticode · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/trailofbits/uthenticode/commit/caeb1eb62412605f71bd96ce9bb9420644b6db53","name":"https://github.com/trailofbits/uthenticode/commit/caeb1eb62412605f71bd96ce9bb9420644b6db53","refsource":"MISC","tags":[],"title":"src: bump OpenSSL, EKU check (#78) · trailofbits/uthenticode@caeb1eb · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-40012","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-40012","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"40012","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trailofbits","cpe5":"uthenticode","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-40012","ASSIGNER":"security-advisories@github.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"uthenticode is a small cross-platform library for partially verifying Authenticode digital signatures. Versions of uthenticode prior to the 2.x series did not check Extended Key Usages in certificates, in violation of the Authenticode X.509 certificate profile. As a result, a malicious user could produce a \"signed\" PE file that uthenticode would verify and consider valid using an X.509 certificate that isn't entitled to produce code signatures (e.g., a SSL certificate). By design, uthenticode does not perform full-chain validation. However, the absence of EKU validation was an unintended oversight. The 2.0.0 release series includes EKU checks. There are no workarounds to this vulnerability."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-325: Missing Cryptographic Step","cweId":"CWE-325"}]},{"description":[{"lang":"eng","value":"CWE-347: Improper Verification of Cryptographic Signature","cweId":"CWE-347"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"trailofbits","product":{"product_data":[{"product_name":"uthenticode","version":{"version_data":[{"version_affected":"=","version_value":"< 2.0.0"}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/trailofbits/uthenticode/security/advisories/GHSA-gm2f-j4rj-6xqj","refsource":"MISC","name":"https://github.com/trailofbits/uthenticode/security/advisories/GHSA-gm2f-j4rj-6xqj"},{"url":"https://github.com/trailofbits/uthenticode/pull/78","refsource":"MISC","name":"https://github.com/trailofbits/uthenticode/pull/78"},{"url":"https://github.com/trailofbits/uthenticode/commit/caeb1eb62412605f71bd96ce9bb9420644b6db53","refsource":"MISC","name":"https://github.com/trailofbits/uthenticode/commit/caeb1eb62412605f71bd96ce9bb9420644b6db53"}]},"source":{"advisory":"GHSA-gm2f-j4rj-6xqj","discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.9,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N","version":"3.1"}]}},"nvd":{"publishedDate":"2023-08-09 16:15:00","lastModifiedDate":"2023-08-16 17:40:00","problem_types":["CWE-347"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:trailofbits:uthenticode:*:*:*:*:*:*:*:*","versionEndExcluding":"2.0.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}