CVE-2022-23649: CWE-295: Improper Certificate Validation in sigstore cosign
Cosign provides container signing, verification, and storage in an OCI registry for the sigstore project. Prior to version 1.5.2, Cosign can be manipulated to claim that an entry for a signature exists in the Rekor transparency log even if it doesn't. This requires the attacker to have pull and push permissions for the signature in OCI. This can happen with both standard signing with a keypair and "keyless signing" with Fulcio. If an attacker has access to the signature in OCI, they can manipulate cosign into believing the entry was stored in Rekor even though it wasn't. The vulnerability has been patched in v1.5.2 of Cosign. The `signature` in the `signedEntryTimestamp` provided by Rekor is now compared to the `signature` that is being verified. If these don't match, then an error is returned. If a valid bundle is copied to a different signature, verification should fail. Cosign output now only informs the user that certificates were verified if a certificate was in fact verified. There is currently no known workaround.
AI Analysis
Technical Summary
CVE-2022-23649 is a vulnerability in the sigstore project's cosign tool, which is used for container image signing, verification, and storage within OCI registries. Prior to version 1.5.2, cosign improperly validated certificate signatures related to entries in the Rekor transparency log. Specifically, an attacker with both pull and push permissions for signatures in the OCI registry could manipulate cosign into falsely believing that a signature entry existed in the Rekor log when it did not. This flaw affects both standard keypair-based signing and keyless signing using Fulcio. The root cause is that cosign did not verify that the signature in the Rekor log's signedEntryTimestamp matched the signature being verified, allowing an attacker to copy a valid signature bundle to a different signature and bypass verification. The vulnerability compromises the integrity assurance that cosign aims to provide, as it can be tricked into accepting unsigned or tampered container images as validly signed. The issue was addressed in cosign version 1.5.2 by adding a strict comparison between the Rekor log signature and the signature under verification, and by ensuring that cosign only reports certificate verification success if a certificate was genuinely verified. There is no known workaround other than upgrading to the patched version. No known exploits have been reported in the wild to date.
Potential Impact
For European organizations relying on cosign for container image signing and verification, this vulnerability undermines the trustworthiness of container supply chains. Attackers with push and pull access to the OCI registry could inject or substitute container images with malicious payloads while making cosign falsely report them as properly signed and logged in Rekor. This could lead to deployment of compromised containers in production environments, potentially resulting in unauthorized code execution, data breaches, or disruption of critical services. Given the increasing adoption of containerization and DevSecOps practices in Europe, especially in sectors like finance, manufacturing, and critical infrastructure, the impact could be significant. The integrity and provenance guarantees provided by cosign are critical for compliance with security standards and regulations such as the EU Cybersecurity Act and NIS2 Directive. Failure to patch this vulnerability could expose organizations to supply chain attacks and compliance violations.
Mitigation Recommendations
The primary mitigation is to upgrade all cosign deployments to version 1.5.2 or later, where the vulnerability is patched. Organizations should audit their container signing workflows to ensure no legacy versions of cosign are in use. Additionally, restrict OCI registry permissions rigorously to minimize the number of users or systems with push and pull rights for signatures, reducing the attack surface. Implement monitoring and alerting on unusual signature push or pull activities in the OCI registry. Integrate additional verification steps in CI/CD pipelines, such as cross-checking signatures against multiple transparency logs or using complementary signing tools to detect anomalies. For environments where immediate upgrade is not feasible, consider isolating cosign usage to non-production environments until patched. Finally, educate DevOps and security teams about the importance of verifying signature provenance and the risks of improper certificate validation.
Affected Countries
Germany, France, Netherlands, United Kingdom, Sweden, Finland, Belgium, Italy
CVE-2022-23649: CWE-295: Improper Certificate Validation in sigstore cosign
Description
Cosign provides container signing, verification, and storage in an OCI registry for the sigstore project. Prior to version 1.5.2, Cosign can be manipulated to claim that an entry for a signature exists in the Rekor transparency log even if it doesn't. This requires the attacker to have pull and push permissions for the signature in OCI. This can happen with both standard signing with a keypair and "keyless signing" with Fulcio. If an attacker has access to the signature in OCI, they can manipulate cosign into believing the entry was stored in Rekor even though it wasn't. The vulnerability has been patched in v1.5.2 of Cosign. The `signature` in the `signedEntryTimestamp` provided by Rekor is now compared to the `signature` that is being verified. If these don't match, then an error is returned. If a valid bundle is copied to a different signature, verification should fail. Cosign output now only informs the user that certificates were verified if a certificate was in fact verified. There is currently no known workaround.
AI-Powered Analysis
Technical Analysis
CVE-2022-23649 is a vulnerability in the sigstore project's cosign tool, which is used for container image signing, verification, and storage within OCI registries. Prior to version 1.5.2, cosign improperly validated certificate signatures related to entries in the Rekor transparency log. Specifically, an attacker with both pull and push permissions for signatures in the OCI registry could manipulate cosign into falsely believing that a signature entry existed in the Rekor log when it did not. This flaw affects both standard keypair-based signing and keyless signing using Fulcio. The root cause is that cosign did not verify that the signature in the Rekor log's signedEntryTimestamp matched the signature being verified, allowing an attacker to copy a valid signature bundle to a different signature and bypass verification. The vulnerability compromises the integrity assurance that cosign aims to provide, as it can be tricked into accepting unsigned or tampered container images as validly signed. The issue was addressed in cosign version 1.5.2 by adding a strict comparison between the Rekor log signature and the signature under verification, and by ensuring that cosign only reports certificate verification success if a certificate was genuinely verified. There is no known workaround other than upgrading to the patched version. No known exploits have been reported in the wild to date.
Potential Impact
For European organizations relying on cosign for container image signing and verification, this vulnerability undermines the trustworthiness of container supply chains. Attackers with push and pull access to the OCI registry could inject or substitute container images with malicious payloads while making cosign falsely report them as properly signed and logged in Rekor. This could lead to deployment of compromised containers in production environments, potentially resulting in unauthorized code execution, data breaches, or disruption of critical services. Given the increasing adoption of containerization and DevSecOps practices in Europe, especially in sectors like finance, manufacturing, and critical infrastructure, the impact could be significant. The integrity and provenance guarantees provided by cosign are critical for compliance with security standards and regulations such as the EU Cybersecurity Act and NIS2 Directive. Failure to patch this vulnerability could expose organizations to supply chain attacks and compliance violations.
Mitigation Recommendations
The primary mitigation is to upgrade all cosign deployments to version 1.5.2 or later, where the vulnerability is patched. Organizations should audit their container signing workflows to ensure no legacy versions of cosign are in use. Additionally, restrict OCI registry permissions rigorously to minimize the number of users or systems with push and pull rights for signatures, reducing the attack surface. Implement monitoring and alerting on unusual signature push or pull activities in the OCI registry. Integrate additional verification steps in CI/CD pipelines, such as cross-checking signatures against multiple transparency logs or using complementary signing tools to detect anomalies. For environments where immediate upgrade is not feasible, consider isolating cosign usage to non-production environments until patched. Finally, educate DevOps and security teams about the importance of verifying signature provenance and the risks of improper certificate validation.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-01-19T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9842c4522896dcbf2602
Added to database: 5/21/2025, 9:09:22 AM
Last enriched: 6/23/2025, 4:02:25 PM
Last updated: 2/7/2026, 3:35:09 PM
Views: 31
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2089: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2088: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2026-2087: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2086: Buffer Overflow in UTT HiPER 810G
HighOrganizations Urged to Replace Discontinued Edge Devices
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.