Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66564: CWE-405: Asymmetric Resource Consumption (Amplification) in sigstore timestamp-authority

0
High
VulnerabilityCVE-2025-66564cvecve-2025-66564cwe-405
Published: Thu Dec 04 2025 (12/04/2025, 22:37:13 UTC)
Source: CVE Database V5
Vendor/Project: sigstore
Product: timestamp-authority

Description

Sigstore Timestamp Authority is a service for issuing RFC 3161 timestamps. Prior to 2.0.3, Function api.ParseJSONRequest currently splits (via a call to strings.Split) an optionally-provided OID (which is untrusted data) on periods. Similarly, function api.getContentType splits the Content-Type header (which is also untrusted data) on an application string. As a result, in the face of a malicious request with either an excessively long OID in the payload containing many period characters or a malformed Content-Type header, a call to api.ParseJSONRequest or api.getContentType incurs allocations of O(n) bytes (where n stands for the length of the function's argument). This vulnerability is fixed in 2.0.3.

AI-Powered Analysis

AILast updated: 12/04/2025, 23:05:32 UTC

Technical Analysis

The vulnerability identified as CVE-2025-66564 affects the sigstore timestamp-authority service, which issues RFC 3161 timestamps used for cryptographic signing and verification. Prior to version 2.0.3, the service's api.ParseJSONRequest function processes an optionally provided OID string by splitting it on period characters, and the api.getContentType function similarly splits the Content-Type header string. Both inputs are untrusted and can be manipulated by an attacker. When these inputs contain an excessively large number of period characters or are malformed, the splitting operations cause the service to allocate memory linearly proportional to the input length (O(n)). This asymmetric resource consumption can be exploited to amplify resource usage on the server side, potentially leading to denial of service conditions by exhausting memory or CPU resources. The vulnerability does not affect confidentiality or integrity but severely impacts availability. Exploitation requires no privileges or user interaction and can be performed remotely over the network. The issue was addressed in sigstore timestamp-authority version 2.0.3 by improving input validation and handling to prevent excessive resource allocation.

Potential Impact

For European organizations, the primary impact of this vulnerability is the risk of denial of service attacks against services relying on the sigstore timestamp-authority for timestamping digital signatures. This could disrupt software supply chain security processes, code signing verification, and other cryptographic workflows dependent on trusted timestamps. Organizations in sectors with stringent software integrity requirements, such as finance, healthcare, and critical infrastructure, may face operational interruptions and compliance challenges. The vulnerability's ease of exploitation and lack of required authentication increase the risk of widespread attacks, potentially affecting cloud providers, software vendors, and enterprises using sigstore timestamp-authority. While no data breach or code tampering is directly enabled, service unavailability could delay critical security operations and undermine trust in digital signatures.

Mitigation Recommendations

European organizations should immediately upgrade all instances of sigstore timestamp-authority to version 2.0.3 or later, where the vulnerability is fixed. In addition, implement network-level protections such as rate limiting and input size validation on incoming requests to the timestamp-authority service to reduce the risk of resource exhaustion. Monitoring and alerting on unusual spikes in resource usage or malformed request patterns targeting the OID or Content-Type fields can provide early detection of exploitation attempts. Employ web application firewalls (WAFs) with custom rules to block requests containing excessively long or malformed OID strings or Content-Type headers. Conduct regular audits of software supply chain components to ensure all dependencies are up to date and free from known vulnerabilities. Finally, consider isolating the timestamp-authority service in a dedicated environment with resource quotas to limit the impact of potential attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-04T16:05:22.975Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69321040c0111c56163950c9

Added to database: 12/4/2025, 10:50:40 PM

Last enriched: 12/4/2025, 11:05:32 PM

Last updated: 12/4/2025, 11:59:34 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats