CVE-2025-66506

7.5 HIGH

📋 TL;DR

This vulnerability in Fulcio allows attackers to cause resource exhaustion through a denial-of-service attack by sending malicious OIDC identity tokens containing many period characters. The vulnerability affects Fulcio servers prior to version 1.8.3 that process untrusted identity tokens. Attackers can trigger excessive memory allocations that could crash or degrade service availability.

💻 Affected Systems

Products:
  • Fulcio
Versions: All versions prior to 1.8.3
Operating Systems: All platforms running Fulcio
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Fulcio servers processing OIDC identity tokens; clients using Fulcio are not directly vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service outage of Fulcio certificate authority, preventing code signing operations and disrupting software supply chain security workflows.

🟠

Likely Case

Degraded performance or temporary service unavailability due to memory exhaustion, requiring manual intervention to restore service.

🟢

If Mitigated

Minimal impact with proper rate limiting, request validation, and resource monitoring in place.

🌐 Internet-Facing: HIGH - Fulcio servers are typically internet-facing to accept certificate signing requests from various clients.
🏢 Internal Only: LOW - This primarily affects internet-facing Fulcio instances; internal-only deployments have reduced attack surface.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specially crafted OIDC identity tokens; no authentication needed as Fulcio accepts certificate signing requests from untrusted sources.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.8.3

Vendor Advisory: https://github.com/sigstore/fulcio/security/advisories/GHSA-f83f-xpx7-ffpw

Restart Required: Yes

Instructions:

1. Stop Fulcio service. 2. Update to version 1.8.3 or later using package manager or direct download. 3. Restart Fulcio service. 4. Verify service is running correctly.

🔧 Temporary Workarounds

Rate limiting

all

Implement request rate limiting to prevent mass exploitation attempts

# Configure rate limiting in your reverse proxy or load balancer
# Example nginx: limit_req_zone $binary_remote_addr zone=fulcio:10m rate=10r/s;

Request size limiting

all

Limit maximum request size to prevent large malicious payloads

# Configure in web server or application
# Example: client_max_body_size 1M; in nginx

🧯 If You Can't Patch

  • Implement strict input validation to reject OIDC tokens with excessive periods before processing
  • Deploy behind a WAF with DoS protection rules and request inspection capabilities

🔍 How to Verify

Check if Vulnerable:

Check Fulcio version: if version < 1.8.3, system is vulnerable

Check Version:

fulcio version

Verify Fix Applied:

Verify Fulcio version is 1.8.3 or later and test with sample requests

📡 Detection & Monitoring

Log Indicators:

  • High memory usage spikes
  • Process crashes or restarts
  • Requests with unusually large OIDC tokens
  • Error logs mentioning memory allocation failures

Network Indicators:

  • Unusually large HTTP requests to Fulcio endpoints
  • High volume of requests from single sources
  • Requests containing OIDC tokens with many period characters

SIEM Query:

source="fulcio" AND (memory_usage>90% OR error="out of memory" OR request_size>100KB)

🔗 References

📤 Share & Export