Skip to main content

CVE-2024-23332: CWE-672: Operation on a Resource after Expiration or Release in notaryproject specifications

Medium
VulnerabilityCVE-2024-23332cvecve-2024-23332cwe-672
Published: Fri Jan 19 2024 (01/19/2024, 22:19:37 UTC)
Source: CVE Database V5
Vendor/Project: notaryproject
Product: specifications

Description

The Notary Project is a set of specifications and tools intended to provide a cross-industry standard for securing software supply chains by using authentic container images and other OCI artifacts. An external actor with control of a compromised container registry can provide outdated versions of OCI artifacts, such as Images. This could lead artifact consumers with relaxed trust policies (such as `permissive` instead of `strict`) to potentially use artifacts with signatures that are no longer valid, making them susceptible to any exploits those artifacts may contain. In Notary Project, an artifact publisher can control the validity period of artifact by specifying signature expiry during the signing process. Using shorter signature validity periods along with processes to periodically resign artifacts, allows artifact producers to ensure that their consumers will only receive up-to-date artifacts. Artifact consumers should correspondingly use a `strict` or equivalent trust policy that enforces signature expiry. Together these steps enable use of up-to-date artifacts and safeguard against rollback attack in the event of registry compromise. The Notary Project offers various signature validation options such as `permissive`, `audit` and `skip` to support various scenarios. These scenarios includes 1) situations demanding urgent workload deployment, necessitating the bypassing of expired or revoked signatures; 2) auditing of artifacts lacking signatures without interrupting workload; and 3) skipping of verification for specific images that might have undergone validation through alternative mechanisms. Additionally, the Notary Project supports revocation to ensure the signature freshness. Artifact publishers can sign with short-lived certificates and revoke older certificates when necessary. This revocation serves as a signal to inform artifact consumers that the corresponding unexpired artifact is no longer approved by the publisher. This enables the artifact publisher to control the validity of the signature independently of their ability to manage artifacts in a compromised registry.

AI-Powered Analysis

AILast updated: 07/08/2025, 17:11:37 UTC

Technical Analysis

CVE-2024-23332 is a medium-severity vulnerability affecting the Notary Project specifications up to version 1.0.1. The Notary Project provides a standardized framework for securing software supply chains by authenticating container images and other OCI (Open Container Initiative) artifacts through digital signatures. This vulnerability arises from improper handling of artifact signature validity periods, specifically an operation on a resource after its expiration or release (CWE-672). In scenarios where an attacker has compromised a container registry, they can serve outdated OCI artifacts with expired or revoked signatures. If artifact consumers use relaxed trust policies such as 'permissive' instead of 'strict', they may accept these outdated artifacts, potentially exposing themselves to known vulnerabilities or malicious code embedded in those older versions. The Notary Project allows artifact publishers to specify signature expiry during signing, enabling short-lived signatures and periodic resigning to ensure consumers only receive current, valid artifacts. Additionally, revocation mechanisms allow publishers to invalidate older certificates independently of artifact management capabilities. However, the vulnerability exists because some consumers may bypass strict signature validation, allowing rollback attacks where attackers substitute newer artifacts with older, vulnerable ones. The CVSS 3.1 score of 4.0 reflects a network attack vector requiring high complexity, high privileges, and user interaction, with no confidentiality impact but low integrity and availability impacts. No known exploits are reported in the wild yet. This vulnerability highlights the critical importance of enforcing strict signature validation policies and leveraging short-lived certificates with revocation to maintain artifact integrity in compromised environments.

Potential Impact

For European organizations, especially those relying on containerized workloads and OCI artifacts in their software supply chains, this vulnerability poses a risk of deploying outdated or compromised software components. Attackers controlling a container registry could perform rollback attacks, causing systems to run vulnerable or malicious code, potentially leading to service disruptions or integrity breaches. This risk is heightened in sectors with stringent supply chain security requirements such as finance, healthcare, and critical infrastructure. The impact on confidentiality is minimal, but integrity and availability could be affected if attackers exploit known vulnerabilities in outdated artifacts. Organizations with relaxed trust policies or lacking automated artifact resigning and revocation processes are particularly vulnerable. Given the increasing adoption of container technologies across Europe, the threat could affect a broad range of enterprises, from startups to large-scale cloud providers. However, the requirement for high privileges and user interaction to exploit reduces the likelihood of widespread automated attacks, making targeted attacks more probable. The vulnerability also underscores the importance of supply chain security governance and compliance with European cybersecurity frameworks.

Mitigation Recommendations

European organizations should enforce strict signature validation policies ('strict' or equivalent) in their artifact consumption workflows to reject expired or revoked signatures. Implement automated processes for short-lived signature issuance and periodic artifact resigning to minimize the window of exposure. Utilize the Notary Project's revocation features to promptly invalidate compromised or outdated certificates. Container registries should be secured with robust access controls and monitoring to prevent unauthorized modifications. Integrate continuous supply chain security scanning to detect usage of outdated or vulnerable artifacts. Educate DevOps and security teams on the risks of permissive trust policies and rollback attacks. Where urgent deployment scenarios require relaxed policies, implement compensating controls such as additional runtime security monitoring and anomaly detection. Regularly update Notary Project components to versions beyond 1.0.1 once patches are available. Finally, conduct incident response drills simulating registry compromise to validate detection and mitigation capabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2024-01-15T15:19:19.442Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6839c41d182aa0cae2b435f9

Added to database: 5/30/2025, 2:43:41 PM

Last enriched: 7/8/2025, 5:11:37 PM

Last updated: 7/28/2025, 2:52:03 PM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats