Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66506: CWE-405: Asymmetric Resource Consumption (Amplification) in sigstore fulcio

0
High
VulnerabilityCVE-2025-66506cvecve-2025-66506cwe-405
Published: Thu Dec 04 2025 (12/04/2025, 22:04:41 UTC)
Source: CVE Database V5
Vendor/Project: sigstore
Product: fulcio

Description

Fulcio is a free-to-use certificate authority for issuing code signing certificates for an OpenID Connect (OIDC) identity. Prior to 1.8.3, function identity.extractIssuerURL splits (via a call to strings.Split) its argument (which is untrusted data) on periods. As a result, in the face of a malicious request with an (invalid) OIDC identity token in the payload containing many period characters, a call to extractIssuerURL incurs allocations to the tune of O(n) bytes (where n stands for the length of the function's argument), with a constant factor of about 16. This vulnerability is fixed in 1.8.3.

AI-Powered Analysis

AILast updated: 12/12/2025, 00:12:31 UTC

Technical Analysis

CVE-2025-66506 is a vulnerability classified under CWE-405 (Asymmetric Resource Consumption) affecting the sigstore fulcio project, a free-to-use certificate authority that issues code signing certificates based on OpenID Connect (OIDC) identities. The flaw exists in versions prior to 1.8.3 within the function identity.extractIssuerURL, which processes untrusted OIDC identity tokens by splitting the input string on period characters using strings.Split. When a malicious actor submits an OIDC token containing an excessive number of periods, the function allocates memory proportional to the input length with a high constant factor (~16), leading to disproportionate resource consumption. This can cause the fulcio service to exhaust memory or CPU resources, resulting in denial of service (DoS). The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. Although it does not compromise confidentiality or integrity, the availability impact is significant. The issue was publicly disclosed on December 4, 2025, with a CVSS v3.1 score of 7.5 (high severity), reflecting its ease of exploitation and impact on availability. No known exploits are reported in the wild yet. The vulnerability is mitigated by upgrading fulcio to version 1.8.3, where the input handling logic has been corrected to prevent excessive allocations. Additional defensive measures include implementing input validation to limit the number of periods in OIDC tokens and applying rate limiting to reduce the risk of resource exhaustion attacks.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the availability of the sigstore fulcio service, which is critical for issuing code signing certificates used in software supply chains. Disruption of fulcio can delay or prevent code signing operations, potentially halting software deployment pipelines and impacting development velocity and security assurance processes. Organizations relying on automated signing and verification workflows may face operational downtime or forced manual interventions. While confidentiality and integrity remain unaffected, the denial of service potential can indirectly affect trust in software authenticity if signing services become unreliable. The risk is heightened for cloud service providers, software vendors, and enterprises with continuous integration/continuous deployment (CI/CD) pipelines that integrate sigstore fulcio. Given the remote, unauthenticated exploit vector, attackers can launch large-scale amplification attacks to degrade service availability. This could be leveraged as part of broader supply chain attacks or to disrupt critical software infrastructure. European entities involved in open source projects or those adopting sigstore for secure software signing should prioritize mitigation to maintain operational resilience.

Mitigation Recommendations

1. Upgrade fulcio to version 1.8.3 or later immediately to apply the official fix addressing the resource consumption vulnerability. 2. Implement strict input validation on OIDC identity tokens before processing, specifically limiting the number of period characters allowed to prevent excessive splitting and memory allocation. 3. Deploy rate limiting and throttling mechanisms on endpoints handling OIDC tokens to mitigate the risk of large-scale or repeated malicious requests. 4. Monitor fulcio service resource usage and logs for abnormal spikes in memory or CPU consumption indicative of exploitation attempts. 5. Consider deploying web application firewalls (WAFs) or API gateways with custom rules to detect and block malformed OIDC tokens with excessive delimiters. 6. Incorporate anomaly detection for unusual request patterns targeting the certificate issuance service. 7. Educate development and security teams about the vulnerability and ensure secure coding practices when handling untrusted input in similar contexts. 8. Review and harden CI/CD pipeline dependencies on fulcio to include fallback or redundancy measures in case of service disruption.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-03T15:12:22.978Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693209ac2bd9ee5f78fe683e

Added to database: 12/4/2025, 10:22:36 PM

Last enriched: 12/12/2025, 12:12:31 AM

Last updated: 1/18/2026, 12:04:31 PM

Views: 166

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats