Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-31960: CWE-770: Allocation of Resources Without Limits or Throttling in anchore quill

0
Medium
VulnerabilityCVE-2026-31960cvecve-2026-31960cwe-770
Published: Wed Mar 11 2026 (03/11/2026, 19:31:34 UTC)
Source: CVE Database V5
Vendor/Project: anchore
Product: quill

Description

CVE-2026-31960 is a medium-severity vulnerability in Anchore's Quill tool (versions before 0. 7. 1) that causes unbounded memory consumption during the Apple notarization process. Quill reads the entire HTTP response body from Apple's notarization service without size limits, which can lead to out-of-memory crashes if an attacker controls the response content. Exploitation requires the ability to intercept or modify HTTPS traffic, which is generally prevented by TLS certificate validation but possible in environments with TLS interception proxies or compromised certificate authorities. The impact is limited to availability, causing denial of service on the Quill client or library during notarization. There is no impact on confidentiality or integrity. The vulnerability is fixed in version 0. 7. 1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/19/2026, 02:18:17 UTC

Technical Analysis

CVE-2026-31960 is a resource exhaustion vulnerability categorized under CWE-770 affecting Anchore's Quill tool versions prior to 0.7.1. Quill facilitates macOS binary signing and notarization by interacting with Apple's notarization service over HTTPS. The vulnerability arises because Quill reads the entire HTTP response body from the notarization API into memory without imposing any size limits or throttling mechanisms. If an attacker can manipulate the HTTP response content—by injecting an arbitrarily large payload—Quill will consume excessive memory, potentially leading to application crashes or denial of service. Under normal circumstances, exploitation is highly unlikely because Apple's notarization service uses HTTPS with proper TLS certificate validation, preventing man-in-the-middle attacks. However, environments that deploy TLS-intercepting proxies (common in corporate networks for monitoring), have compromised or untrusted certificate authorities, or suffer from other trust boundary violations are vulnerable. Both the Quill command-line interface and its library components are affected when performing notarization operations. The vulnerability impacts availability only, with no confidentiality or integrity compromise. The issue was addressed and fixed in Quill version 0.7.1 by implementing appropriate limits on HTTP response body reads to prevent unbounded memory allocation.

Potential Impact

The primary impact of CVE-2026-31960 is denial of service due to resource exhaustion. Organizations relying on Quill for macOS binary signing and notarization may experience crashes or service interruptions during the notarization process if an attacker can manipulate the notarization API responses. This can delay software release cycles and disrupt automated build or deployment pipelines. Since the vulnerability requires the ability to intercept or modify HTTPS traffic, environments with TLS interception proxies or compromised trust stores are at higher risk. Although the vulnerability does not affect confidentiality or integrity, the availability impact can be significant for development teams and CI/CD environments that depend on Quill. Additionally, repeated exploitation attempts could lead to operational instability or increased support costs. The lack of known exploits in the wild reduces immediate risk, but the presence of this vulnerability in widely used developer tooling warrants prompt remediation to avoid potential future attacks.

Mitigation Recommendations

1. Upgrade Quill to version 0.7.1 or later, where the vulnerability is fixed by enforcing limits on HTTP response body size during notarization. 2. Review and restrict the use of TLS-intercepting proxies within the network, especially for developer environments, to prevent man-in-the-middle attacks on notarization traffic. 3. Ensure that all certificate authorities trusted by the environment are legitimate and have not been compromised. 4. Implement network segmentation to isolate build and notarization systems from untrusted networks. 5. Monitor notarization processes for abnormal memory usage or crashes that could indicate exploitation attempts. 6. Use endpoint security solutions to detect and prevent unauthorized interception or modification of HTTPS traffic. 7. Educate developers and DevOps teams about the risks of TLS interception and encourage secure handling of notarization operations. 8. Consider additional runtime memory limits or container resource constraints on systems running Quill to mitigate impact of potential resource exhaustion.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-10T15:40:10.482Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b1c6312f860ef9436c35f4

Added to database: 3/11/2026, 7:44:49 PM

Last enriched: 3/19/2026, 2:18:17 AM

Last updated: 4/25/2026, 3:56:43 AM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses