Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-31960: CWE-770: Allocation of Resources Without Limits or Throttling in anchore quill

0
Medium
VulnerabilityCVE-2026-31960cvecve-2026-31960cwe-770
Published: Wed Mar 11 2026 (03/11/2026, 19:31:34 UTC)
Source: CVE Database V5
Vendor/Project: anchore
Product: quill

Description

Quill provides simple mac binary signing and notarization from any platform. Quill before version v0.7.1 has unbounded reads of HTTP response bodies during the Apple notarization process. Exploitation requires the ability to modify API responses from Apple's notarization service, which is not possible under standard network conditions due to HTTPS with proper TLS certificate validation; however, environments with TLS-intercepting proxies (common in corporate networks), compromised certificate authorities, or other trust boundary violations are at risk. When processing HTTP responses during notarization, Quill reads the entire response body into memory without any size limit. An attacker who can control or modify the response content can return an arbitrarily large payload, causing the Quill client to run out of memory and crash. The impact is limited to availability; there is no effect on confidentiality or integrity. Both the Quill CLI and library are affected when used to perform notarization operations. This vulnerability is fixed in 0.7.1.

AI-Powered Analysis

AILast updated: 03/11/2026, 20:00:10 UTC

Technical Analysis

CVE-2026-31960 is a resource exhaustion vulnerability classified under CWE-770, affecting Anchore's Quill tool used for macOS binary signing and notarization. Prior to version 0.7.1, Quill performs unbounded reads of HTTP response bodies received from Apple's notarization service. Specifically, during the notarization process, Quill reads the entire HTTP response body into memory without imposing any size limits or throttling mechanisms. This behavior allows an attacker who can manipulate the notarization API responses to supply an arbitrarily large payload, causing Quill to consume excessive memory and ultimately crash due to resource exhaustion. Exploitation requires the ability to intercept and modify HTTPS traffic between Quill and Apple's notarization servers, which is normally prevented by proper TLS certificate validation. However, environments employing TLS-intercepting proxies (common in corporate networks), compromised certificate authorities, or other trust boundary violations are vulnerable. The vulnerability affects both the Quill command-line interface and library components when used for notarization operations. The impact is limited to availability, with no confidentiality or integrity compromise. The vulnerability was publicly disclosed on March 11, 2026, and fixed in Quill version 0.7.1. No known exploits are reported in the wild.

Potential Impact

The primary impact of CVE-2026-31960 is denial of service due to resource exhaustion. An attacker capable of manipulating notarization API responses can cause Quill to crash by forcing it to allocate excessive memory. This disrupts the notarization process, potentially delaying software release cycles or automated signing workflows that rely on Quill. Since Quill is used for macOS binary signing and notarization, organizations that integrate it into their CI/CD pipelines or build systems may experience operational downtime or failures. The vulnerability does not expose sensitive data nor allow code execution or data tampering, limiting its impact to availability. However, in environments where TLS interception or compromised trust exists, the risk of exploitation increases. Organizations relying heavily on Quill for notarization in such environments face increased risk of service disruption. The lack of known exploits reduces immediate threat but does not eliminate risk, especially in targeted attacks against software supply chains.

Mitigation Recommendations

To mitigate CVE-2026-31960, organizations should upgrade Anchore Quill to version 0.7.1 or later, where the vulnerability is fixed by implementing limits on HTTP response body reads. For environments using TLS-intercepting proxies, ensure strict validation of TLS certificates and minimize trust boundary violations to prevent attackers from modifying notarization API responses. Network segmentation and monitoring should be employed to detect anomalous proxy behavior or certificate anomalies. Additionally, consider using endpoint security controls to detect and prevent memory exhaustion conditions. Where possible, avoid deploying Quill in environments with untrusted TLS interception. Implement logging and alerting on Quill failures to quickly identify potential exploitation attempts. Finally, review CI/CD and build pipeline security to reduce the risk of man-in-the-middle attacks on notarization traffic.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-10T15:40:10.482Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b1c6312f860ef9436c35f4

Added to database: 3/11/2026, 7:44:49 PM

Last enriched: 3/11/2026, 8:00:10 PM

Last updated: 3/11/2026, 10:00:56 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses