CVE-2022-23649: CWE-295: Improper Certificate Validation in sigstore cosign
Cosign provides container signing, verification, and storage in an OCI registry for the sigstore project. Prior to version 1.5.2, Cosign can be manipulated to claim that an entry for a signature exists in the Rekor transparency log even if it doesn't. This requires the attacker to have pull and push permissions for the signature in OCI. This can happen with both standard signing with a keypair and "keyless signing" with Fulcio. If an attacker has access to the signature in OCI, they can manipulate cosign into believing the entry was stored in Rekor even though it wasn't. The vulnerability has been patched in v1.5.2 of Cosign. The `signature` in the `signedEntryTimestamp` provided by Rekor is now compared to the `signature` that is being verified. If these don't match, then an error is returned. If a valid bundle is copied to a different signature, verification should fail. Cosign output now only informs the user that certificates were verified if a certificate was in fact verified. There is currently no known workaround.
AI Analysis
Technical Summary
CVE-2022-23649 is a vulnerability in the sigstore project's cosign tool, which is used for container image signing, verification, and storage within OCI registries. Prior to version 1.5.2, cosign improperly validated certificate signatures related to entries in the Rekor transparency log. Specifically, an attacker with both pull and push permissions for signatures in the OCI registry could manipulate cosign into falsely believing that a signature entry existed in the Rekor log when it did not. This flaw affects both standard keypair-based signing and keyless signing using Fulcio. The root cause is that cosign did not verify that the signature in the Rekor log's signedEntryTimestamp matched the signature being verified, allowing an attacker to copy a valid signature bundle to a different signature and bypass verification. The vulnerability compromises the integrity assurance that cosign aims to provide, as it can be tricked into accepting unsigned or tampered container images as validly signed. The issue was addressed in cosign version 1.5.2 by adding a strict comparison between the Rekor log signature and the signature under verification, and by ensuring that cosign only reports certificate verification success if a certificate was genuinely verified. There is no known workaround other than upgrading to the patched version. No known exploits have been reported in the wild to date.
Potential Impact
For European organizations relying on cosign for container image signing and verification, this vulnerability undermines the trustworthiness of container supply chains. Attackers with push and pull access to the OCI registry could inject or substitute container images with malicious payloads while making cosign falsely report them as properly signed and logged in Rekor. This could lead to deployment of compromised containers in production environments, potentially resulting in unauthorized code execution, data breaches, or disruption of critical services. Given the increasing adoption of containerization and DevSecOps practices in Europe, especially in sectors like finance, manufacturing, and critical infrastructure, the impact could be significant. The integrity and provenance guarantees provided by cosign are critical for compliance with security standards and regulations such as the EU Cybersecurity Act and NIS2 Directive. Failure to patch this vulnerability could expose organizations to supply chain attacks and compliance violations.
Mitigation Recommendations
The primary mitigation is to upgrade all cosign deployments to version 1.5.2 or later, where the vulnerability is patched. Organizations should audit their container signing workflows to ensure no legacy versions of cosign are in use. Additionally, restrict OCI registry permissions rigorously to minimize the number of users or systems with push and pull rights for signatures, reducing the attack surface. Implement monitoring and alerting on unusual signature push or pull activities in the OCI registry. Integrate additional verification steps in CI/CD pipelines, such as cross-checking signatures against multiple transparency logs or using complementary signing tools to detect anomalies. For environments where immediate upgrade is not feasible, consider isolating cosign usage to non-production environments until patched. Finally, educate DevOps and security teams about the importance of verifying signature provenance and the risks of improper certificate validation.
Affected Countries
Germany, France, Netherlands, United Kingdom, Sweden, Finland, Belgium, Italy
CVE-2022-23649: CWE-295: Improper Certificate Validation in sigstore cosign
Description
Cosign provides container signing, verification, and storage in an OCI registry for the sigstore project. Prior to version 1.5.2, Cosign can be manipulated to claim that an entry for a signature exists in the Rekor transparency log even if it doesn't. This requires the attacker to have pull and push permissions for the signature in OCI. This can happen with both standard signing with a keypair and "keyless signing" with Fulcio. If an attacker has access to the signature in OCI, they can manipulate cosign into believing the entry was stored in Rekor even though it wasn't. The vulnerability has been patched in v1.5.2 of Cosign. The `signature` in the `signedEntryTimestamp` provided by Rekor is now compared to the `signature` that is being verified. If these don't match, then an error is returned. If a valid bundle is copied to a different signature, verification should fail. Cosign output now only informs the user that certificates were verified if a certificate was in fact verified. There is currently no known workaround.
AI-Powered Analysis
Technical Analysis
CVE-2022-23649 is a vulnerability in the sigstore project's cosign tool, which is used for container image signing, verification, and storage within OCI registries. Prior to version 1.5.2, cosign improperly validated certificate signatures related to entries in the Rekor transparency log. Specifically, an attacker with both pull and push permissions for signatures in the OCI registry could manipulate cosign into falsely believing that a signature entry existed in the Rekor log when it did not. This flaw affects both standard keypair-based signing and keyless signing using Fulcio. The root cause is that cosign did not verify that the signature in the Rekor log's signedEntryTimestamp matched the signature being verified, allowing an attacker to copy a valid signature bundle to a different signature and bypass verification. The vulnerability compromises the integrity assurance that cosign aims to provide, as it can be tricked into accepting unsigned or tampered container images as validly signed. The issue was addressed in cosign version 1.5.2 by adding a strict comparison between the Rekor log signature and the signature under verification, and by ensuring that cosign only reports certificate verification success if a certificate was genuinely verified. There is no known workaround other than upgrading to the patched version. No known exploits have been reported in the wild to date.
Potential Impact
For European organizations relying on cosign for container image signing and verification, this vulnerability undermines the trustworthiness of container supply chains. Attackers with push and pull access to the OCI registry could inject or substitute container images with malicious payloads while making cosign falsely report them as properly signed and logged in Rekor. This could lead to deployment of compromised containers in production environments, potentially resulting in unauthorized code execution, data breaches, or disruption of critical services. Given the increasing adoption of containerization and DevSecOps practices in Europe, especially in sectors like finance, manufacturing, and critical infrastructure, the impact could be significant. The integrity and provenance guarantees provided by cosign are critical for compliance with security standards and regulations such as the EU Cybersecurity Act and NIS2 Directive. Failure to patch this vulnerability could expose organizations to supply chain attacks and compliance violations.
Mitigation Recommendations
The primary mitigation is to upgrade all cosign deployments to version 1.5.2 or later, where the vulnerability is patched. Organizations should audit their container signing workflows to ensure no legacy versions of cosign are in use. Additionally, restrict OCI registry permissions rigorously to minimize the number of users or systems with push and pull rights for signatures, reducing the attack surface. Implement monitoring and alerting on unusual signature push or pull activities in the OCI registry. Integrate additional verification steps in CI/CD pipelines, such as cross-checking signatures against multiple transparency logs or using complementary signing tools to detect anomalies. For environments where immediate upgrade is not feasible, consider isolating cosign usage to non-production environments until patched. Finally, educate DevOps and security teams about the importance of verifying signature provenance and the risks of improper certificate validation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-01-19T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9842c4522896dcbf2602
Added to database: 5/21/2025, 9:09:22 AM
Last enriched: 6/23/2025, 4:02:25 PM
Last updated: 7/25/2025, 9:13:23 PM
Views: 10
Related Threats
CVE-2025-25235: CWE-918 Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway
HighCVE-2025-55151: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-55150: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-54992: CWE-611: Improper Restriction of XML External Entity Reference in telstra open-kilda
MediumCVE-2025-55012: CWE-288: Authentication Bypass Using an Alternate Path or Channel in zed-industries zed
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.