Skip to main content

CVE-2022-23491: CWE-345: Insufficient Verification of Data Authenticity in certifi python-certifi

Medium
Published: Wed Dec 07 2022 (12/07/2022, 21:15:53 UTC)
Source: CVE
Vendor/Project: certifi
Product: python-certifi

Description

Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi 2022.12.07 removes root certificates from "TrustCor" from the root store. These are in the process of being removed from Mozilla's trust store. TrustCor's root certificates are being removed pursuant to an investigation prompted by media reporting that TrustCor's ownership also operated a business that produced spyware. Conclusions of Mozilla's investigation can be found in the linked google group discussion.

AI-Powered Analysis

AILast updated: 06/22/2025, 12:50:33 UTC

Technical Analysis

CVE-2022-23491 concerns a vulnerability in the python-certifi package, which is a curated collection of root certificates used to validate the trustworthiness of SSL/TLS certificates. Certifi plays a critical role in verifying the identity of TLS hosts by providing a trusted root certificate store. The vulnerability arises from the inclusion of root certificates issued by TrustCor, a certificate authority whose root certificates were removed from Certifi starting with version 2022.12.07. This removal was prompted by Mozilla's investigation following media reports that TrustCor's ownership was linked to a business producing spyware. Consequently, the root certificates from TrustCor were deemed untrustworthy and removed from Mozilla's root store, which Certifi mirrors. The vulnerability is classified under CWE-345, indicating insufficient verification of data authenticity. In this context, the presence of untrusted or compromised root certificates in the trust store can allow attackers to issue fraudulent certificates that would be accepted as valid by systems relying on Certifi for TLS verification. This could enable man-in-the-middle (MITM) attacks, interception, or spoofing of secure communications. The affected versions are all python-certifi releases prior to 2022.12.07, which still include TrustCor root certificates. There are no known exploits in the wild reported for this vulnerability. The issue is not a direct code flaw but rather a trustworthiness problem in the root certificate store, impacting the integrity of TLS certificate validation. The vulnerability does not require user interaction or authentication to be exploited but depends on the presence of TrustCor root certificates in the trust store and an attacker’s ability to issue certificates under that root. The patch involves removing these root certificates from the trust store, which has been done in Certifi 2022.12.07 and later.

Potential Impact

For European organizations, this vulnerability undermines the foundational trust model of TLS communications when using python-certifi versions prior to 2022.12.07. Since Certifi is widely used in Python applications for SSL certificate verification, any system relying on these versions may accept TLS certificates issued by the distrusted TrustCor root, potentially allowing attackers to intercept or spoof secure communications. This could lead to data confidentiality breaches, credential theft, or injection of malicious content. The impact is particularly significant for organizations handling sensitive data, such as financial institutions, healthcare providers, and government agencies. However, the actual risk depends on whether attackers can leverage TrustCor-issued certificates to impersonate legitimate services. Given that TrustCor root certificates are being removed globally, the risk is mitigated over time as organizations update their Certifi packages. The vulnerability does not directly affect availability but compromises confidentiality and integrity of communications. Since no known exploits exist, the immediate threat is moderate, but the potential for MITM attacks remains until systems are updated.

Mitigation Recommendations

European organizations should immediately audit their Python environments to identify usage of python-certifi versions prior to 2022.12.07. They must upgrade to version 2022.12.07 or later to ensure removal of TrustCor root certificates from the trust store. Additionally, organizations should verify that their TLS clients and servers do not rely on TrustCor certificates by inspecting their local trust stores and certificate chains. Implementing certificate pinning where feasible can reduce reliance on external root stores. Monitoring network traffic for unusual TLS certificate chains or unexpected root authorities can help detect potential misuse. Organizations should also stay informed about updates from Mozilla and Certifi regarding trusted root certificates. For critical systems, consider deploying additional TLS validation layers or using alternative trusted root stores until the environment is fully updated. Finally, ensure that software supply chain processes include timely updates of dependencies like python-certifi to prevent similar issues.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-01-19T21:23:53.763Z
Cisa Enriched
true

Threat ID: 682d9846c4522896dcbf4c83

Added to database: 5/21/2025, 9:09:26 AM

Last enriched: 6/22/2025, 12:50:33 PM

Last updated: 8/8/2025, 10:38:45 AM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats