CVE-2025-66564

7.5 HIGH

📋 TL;DR

This CVE describes a resource exhaustion vulnerability in Sigstore Timestamp Authority where malicious requests with excessively long OIDs or malformed Content-Type headers can cause excessive memory allocations. This affects anyone running Sigstore Timestamp Authority versions before 2.0.3, potentially leading to denial of service.

💻 Affected Systems

Products:
  • Sigstore Timestamp Authority
Versions: All versions prior to 2.0.3
Operating Systems: All platforms running Sigstore Timestamp Authority
Default Config Vulnerable: ⚠️ Yes
Notes: Any deployment exposing the timestamp authority API is vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service unavailability due to memory exhaustion, potentially affecting timestamping services for dependent applications.

🟠

Likely Case

Degraded performance or intermittent service disruptions under targeted attack.

🟢

If Mitigated

Minimal impact with proper rate limiting and request validation in place.

🌐 Internet-Facing: HIGH - The vulnerable functions process untrusted input from external requests.
🏢 Internal Only: MEDIUM - Still vulnerable to internal threats or compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specially crafted requests to the vulnerable endpoints.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.3

Vendor Advisory: https://github.com/sigstore/timestamp-authority/security/advisories/GHSA-4qg8-fj49-pxjh

Restart Required: Yes

Instructions:

1. Stop the timestamp authority service. 2. Update to version 2.0.3 or later. 3. Restart the service.

🔧 Temporary Workarounds

Rate Limiting

all

Implement request rate limiting to prevent mass exploitation attempts.

# Configure rate limiting in your reverse proxy or load balancer

Input Validation

all

Add WAF rules or middleware to reject requests with excessively long OIDs or malformed headers.

# Example nginx rule: location /api/ { limit_req zone=api; }

🧯 If You Can't Patch

  • Implement strict rate limiting and request size limits
  • Deploy behind a WAF with rules to block malicious patterns

🔍 How to Verify

Check if Vulnerable:

Check if running Sigstore Timestamp Authority version < 2.0.3

Check Version:

./timestamp-authority --version

Verify Fix Applied:

Confirm version is 2.0.3 or later and test with normal timestamp requests

📡 Detection & Monitoring

Log Indicators:

  • Unusually large request payloads
  • Multiple failed requests with malformed headers
  • Memory usage spikes

Network Indicators:

  • Requests with extremely long OID parameters
  • Malformed Content-Type headers

SIEM Query:

source="timestamp-authority" AND (request_size>10000 OR status=400)

🔗 References

📤 Share & Export