Skip to main content

CVE-2022-35929: CWE-347: Improper Verification of Cryptographic Signature in sigstore cosign

Medium
Published: Thu Aug 04 2022 (08/04/2022, 18:45:14 UTC)
Source: CVE
Vendor/Project: sigstore
Product: cosign

Description

cosign is a container signing and verification utility. In versions prior to 1.10.1 cosign can report a false positive if any attestation exists. `cosign verify-attestation` used with the `--type` flag will report a false positive verification when there is at least one attestation with a valid signature and there are NO attestations of the type being verified (--type defaults to "custom"). This can happen when signing with a standard keypair and with "keyless" signing with Fulcio. This vulnerability can be reproduced with the `distroless.dev/static@sha256:dd7614b5a12bc4d617b223c588b4e0c833402b8f4991fb5702ea83afad1986e2` image. This image has a `vuln` attestation but not an `spdx` attestation. However, if you run `cosign verify-attestation --type=spdx` on this image, it incorrectly succeeds. This issue has been addressed in version 1.10.1 of cosign. Users are advised to upgrade. There are no known workarounds for this issue.

AI-Powered Analysis

AILast updated: 06/21/2025, 23:55:53 UTC

Technical Analysis

CVE-2022-35929 is a vulnerability in the sigstore cosign utility, a tool widely used for container image signing and verification. The flaw exists in versions prior to 1.10.1 and relates to improper verification of cryptographic signatures (CWE-347). Specifically, when using the 'cosign verify-attestation' command with the '--type' flag, the tool incorrectly reports a successful verification if any attestation with a valid signature exists, regardless of whether an attestation of the specified type is present. By default, the '--type' flag is set to 'custom'. This means that if an image has at least one validly signed attestation of any type but none matching the requested type, the verification will falsely succeed. For example, the distroless.dev/static image with a 'vuln' attestation but no 'spdx' attestation will still pass verification when checked with '--type=spdx'. This undermines the integrity guarantees of attestation verification, potentially allowing attackers to bypass security checks that rely on specific attestation types. The vulnerability affects both standard keypair signing and keyless signing with Fulcio. There are no known workarounds, and the issue was fixed in cosign version 1.10.1. No known exploits have been reported in the wild to date.

Potential Impact

For European organizations relying on cosign for container image verification, this vulnerability can lead to a false sense of security by allowing images to be accepted as verified for specific attestation types when they are not. This can undermine supply chain security, enabling potentially malicious or non-compliant container images to be deployed in production environments. The impact affects confidentiality, integrity, and availability indirectly by permitting unverified or improperly verified images to run, which could contain vulnerabilities or malicious code. Sectors with high reliance on containerized applications, such as finance, healthcare, and critical infrastructure, may face increased risk of supply chain attacks or compliance violations. The vulnerability's exploitation does not require user interaction beyond running the verification command, but it does require the attacker to have control or influence over the attestation metadata. While no active exploits are known, the widespread adoption of cosign in cloud-native environments in Europe increases the potential attack surface. This risk is heightened in environments where strict attestation type verification is critical for regulatory compliance or security policies.

Mitigation Recommendations

The primary mitigation is to upgrade cosign to version 1.10.1 or later, where the vulnerability is fixed. Organizations should audit their container signing and verification workflows to ensure they are not relying on vulnerable versions. Additionally, implement strict policy enforcement that does not solely depend on cosign's attestation verification but also includes secondary validation mechanisms such as manual attestation type checks or integration with complementary security tools. Monitoring and logging of attestation verification results should be enhanced to detect anomalies or unexpected verification successes. For environments using keyless signing with Fulcio, ensure that the signing infrastructure is secured and that attestation metadata is protected from tampering. Finally, organizations should consider isolating critical workloads and applying defense-in-depth strategies to minimize the impact of potentially unverified container images.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-07-15T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9849c4522896dcbf67b2

Added to database: 5/21/2025, 9:09:29 AM

Last enriched: 6/21/2025, 11:55:53 PM

Last updated: 8/17/2025, 6:57:18 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats