{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T05:38:16.715","vulnerabilities":[{"cve":{"id":"CVE-2023-40012","sourceIdentifier":"security-advisories@github.com","published":"2023-08-09T16:15:10.060","lastModified":"2024-11-21T08:18:30.833","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"uthenticode is a small cross-platform library for partially verifying Authenticode digital signatures. Versions of uthenticode prior to the 2.x series did not check Extended Key Usages in certificates, in violation of the Authenticode X.509 certificate profile. As a result, a malicious user could produce a \"signed\" PE file that uthenticode would verify and consider valid using an X.509 certificate that isn't entitled to produce code signatures (e.g., a SSL certificate). By design, uthenticode does not perform full-chain validation. However, the absence of EKU validation was an unintended oversight. The 2.0.0 release series includes EKU checks. There are no workarounds to this vulnerability."},{"lang":"es","value":"uthenticode es una pequeña biblioteca multiplataforma para verificar parcialmente las firmas digitales Authenticode. Las versiones de uthenticode anteriores a la serie 2.x no comprobaban el uso de claves extendidas en los certificados, lo que infringía el perfil de certificado X.509 de Authenticode. Como resultado, un usuario malintencionado podría producir un archivo PE \"firmado\" que uthenticode verificaría y consideraría válido utilizando un certificado X.509 que no está autorizado a producir firmas de código (por ejemplo, un certificado SSL). Por diseño, uthenticode no realiza una validación de cadena completa. Sin embargo, la ausencia de validación EKU fue un descuido involuntario. La versión 2.0.0 incluye comprobaciones EKU. No existen soluciones a esta vulnerabilidad."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-325"},{"lang":"en","value":"CWE-347"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:trailofbits:uthenticode:*:*:*:*:*:*:*:*","versionEndExcluding":"2.0.0","matchCriteriaId":"8765EF72-84AD-4ED2-B5D9-56441DED4F20"}]}]}],"references":[{"url":"https://github.com/trailofbits/uthenticode/commit/caeb1eb62412605f71bd96ce9bb9420644b6db53","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/trailofbits/uthenticode/pull/78","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/trailofbits/uthenticode/security/advisories/GHSA-gm2f-j4rj-6xqj","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://github.com/trailofbits/uthenticode/commit/caeb1eb62412605f71bd96ce9bb9420644b6db53","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/trailofbits/uthenticode/pull/78","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/trailofbits/uthenticode/security/advisories/GHSA-gm2f-j4rj-6xqj","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}