Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22703: CWE-345: Insufficient Verification of Data Authenticity in sigstore cosign

0
Medium
VulnerabilityCVE-2026-22703cvecve-2026-22703cwe-345
Published: Sat Jan 10 2026 (01/10/2026, 06:11:09 UTC)
Source: CVE Database V5
Vendor/Project: sigstore
Product: cosign

Description

Cosign provides code signing and transparency for containers and binaries. Prior to versions 2.6.2 and 3.0.4, Cosign bundle can be crafted to successfully verify an artifact even if the embedded Rekor entry does not reference the artifact's digest, signature or public key. When verifying a Rekor entry, Cosign verifies the Rekor entry signature, and also compares the artifact's digest, the user's public key from either a Fulcio certificate or provided by the user, and the artifact signature to the Rekor entry contents. Without these comparisons, Cosign would accept any response from Rekor as valid. A malicious actor that has compromised a user's identity or signing key could construct a valid Cosign bundle by including any arbitrary Rekor entry, thus preventing the user from being able to audit the signing event. This issue has been patched in versions 2.6.2 and 3.0.4.

AI-Powered Analysis

AILast updated: 01/17/2026, 07:55:51 UTC

Technical Analysis

Cosign is a tool within the sigstore project designed to provide cryptographic signing and transparency for container images and binaries, enhancing software supply chain security. Prior to versions 2.6.2 and 3.0.4, cosign had a vulnerability (CVE-2026-22703) classified under CWE-345 (Insufficient Verification of Data Authenticity). The vulnerability arises because cosign's verification process for Rekor transparency log entries did not adequately ensure that the Rekor entry referenced the artifact's digest, signature, or public key. Specifically, while cosign verified the Rekor entry's signature, it failed to confirm that the embedded Rekor entry matched the artifact being verified. This allowed an attacker who had compromised a user's signing key or identity to create a cosign bundle containing arbitrary Rekor entries unrelated to the actual artifact. Consequently, the user would be unable to audit or verify the legitimacy of the signing event, as cosign would accept any Rekor response as valid. This flaw undermines the integrity of the signing and transparency mechanism, potentially allowing malicious code to appear as legitimately signed. The vulnerability requires local privileges (AV:L) and low complexity (AC:L) to exploit, with no user interaction (UI:N) needed. The scope is unchanged (S:U), and the impact affects integrity (I:H) but not confidentiality or availability. The issue has been addressed in cosign versions 2.6.2 and 3.0.4 by enforcing strict verification that the Rekor entry corresponds correctly to the artifact's digest, signature, and public key.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the integrity of their software supply chain security, particularly for those leveraging cosign for container and binary signing. If exploited, attackers with access to signing credentials can forge signing bundles that appear legitimate, potentially distributing malicious or tampered software without detection. This undermines trust in signed artifacts and can lead to deployment of compromised software in production environments. While confidentiality and availability are not directly impacted, the integrity breach can have cascading effects, including regulatory compliance violations (e.g., under NIS2 or GDPR if software integrity is part of security controls), reputational damage, and operational disruptions. Organizations in sectors with stringent software supply chain requirements, such as finance, healthcare, and critical infrastructure, are especially vulnerable. The requirement for local privileges limits remote exploitation but does not eliminate risk from insider threats or compromised developer environments.

Mitigation Recommendations

European organizations should immediately upgrade cosign to versions 2.6.2 or 3.0.4 or later to ensure the vulnerability is patched. Additionally, organizations should implement strict access controls and monitoring around signing keys and developer environments to prevent credential compromise. Employ hardware security modules (HSMs) or secure key management solutions to protect signing keys and reduce risk of key theft. Integrate continuous monitoring and auditing of signing events and transparency logs to detect anomalies or suspicious Rekor entries. Enforce multi-factor authentication and least privilege principles for users with signing capabilities. Consider implementing additional verification layers or cross-checks in the CI/CD pipeline to validate artifact provenance beyond cosign's built-in checks. Regularly review and update supply chain security policies to incorporate lessons learned from this vulnerability. Finally, educate developers and security teams about the risks of signing key compromise and the importance of timely patching.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-08T19:23:09.857Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6961f0b8c540fa4b5432b9fc

Added to database: 1/10/2026, 6:24:56 AM

Last enriched: 1/17/2026, 7:55:51 AM

Last updated: 2/7/2026, 12:52:40 PM

Views: 263

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats