Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24122: CWE-295: Improper Certificate Validation in sigstore cosign

0
Low
VulnerabilityCVE-2026-24122cvecve-2026-24122cwe-295
Published: Thu Feb 19 2026 (02/19/2026, 22:27:08 UTC)
Source: CVE Database V5
Vendor/Project: sigstore
Product: cosign

Description

CVE-2026-24122 is a low-severity vulnerability in sigstore's cosign versions prior to 3. 0. 5 involving improper certificate validation. Specifically, cosign incorrectly treats issuing certificates as valid during verification even if their validity period expires before the leaf certificate's validity period. This flaw affects private deployments using customized PKIs but does not impact users of the public Sigstore infrastructure. The vulnerability arises because cosign verifies the certificate chain using the leaf certificate's "not before" timestamp without properly checking the expiration of issuing certificates against the signed timestamp or current time. This can lead to acceptance of signatures validated by expired issuing certificates, potentially undermining signature integrity. The issue has been fixed in version 3. 0. 5, and no known exploits are reported in the wild.

AI-Powered Analysis

AILast updated: 02/19/2026, 22:46:37 UTC

Technical Analysis

Cosign is a tool within the sigstore project that provides code signing and transparency for container images and binaries, enhancing supply chain security. In versions 3.0.4 and earlier, a certificate validation flaw exists related to the handling of certificate expiration during signature verification. When verifying artifact signatures, cosign first validates the certificate chain based on the leaf certificate's "not before" timestamp, assuming all issuing certificates in the chain are valid during the leaf's validity period. However, it fails to properly verify whether issuing certificates have expired relative to the signed timestamp or current time. This means that if an issuing certificate's validity period ends before the leaf certificate's, cosign may still accept it as valid, allowing signatures to be trusted even if the issuing certificate was expired at signing time. This improper certificate validation corresponds to CWE-295. The vulnerability primarily affects private deployments of cosign that use customized public key infrastructures (PKIs), as the public Sigstore infrastructure is not impacted. The flaw does not require user interaction or privileges to exploit and has a CVSS v3.1 score of 3.7 (low severity), reflecting limited impact on confidentiality and availability but a potential integrity risk. The issue was publicly disclosed in February 2026 and fixed in cosign version 3.0.5. No known exploits have been reported in the wild, but organizations relying on private PKIs and cosign for code signing should upgrade to avoid risks of accepting signatures validated by expired issuing certificates.

Potential Impact

The primary impact of this vulnerability is on the integrity of code signature verification in private cosign deployments using customized PKIs. An attacker could potentially exploit this flaw to have signatures accepted that were signed with issuing certificates that had already expired, undermining trust in the authenticity and integrity of signed artifacts. This could lead to unauthorized or malicious code being trusted and deployed, increasing the risk of supply chain attacks. However, the vulnerability does not affect confidentiality or availability directly and does not impact users of the public Sigstore infrastructure. The scope is limited to organizations that have private cosign deployments with custom certificate authorities and do not promptly update to the patched version. Since exploitation does not require privileges or user interaction, the risk is primarily operational and depends on the organization's certificate management practices. Overall, the impact is moderate but important for maintaining strong supply chain security in environments relying on cosign with private PKIs.

Mitigation Recommendations

Organizations using cosign for code signing should immediately upgrade to version 3.0.5 or later, where the certificate validation logic has been corrected to properly verify the expiration of issuing certificates against the signed timestamp or current time. For private deployments with customized PKIs, administrators should audit their certificate chains to ensure no expired issuing certificates are in use and validate that their certificate issuance policies align with best practices for validity periods. Implementing continuous monitoring of certificate validity and automated renewal processes can reduce risks of expired certificates being used. Additionally, integrating cosign verification with external timestamp authorities or transparency logs that provide reliable signed timestamps can enhance validation accuracy. Organizations should also review their supply chain security policies to ensure that all code signing tools and dependencies are kept up to date and that verification processes are robust against certificate validation flaws. Finally, consider isolating private PKI infrastructures and limiting their exposure to reduce attack surface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-21T18:38:22.473Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69978f65d7880ec89b384555

Added to database: 2/19/2026, 10:32:05 PM

Last enriched: 2/19/2026, 10:46:37 PM

Last updated: 2/20/2026, 12:27:34 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats