GoSign Desktop versions 2.4.0 and earlier use an unsigned update manifest for distributing application updates. The manifest contains package URLs and SHA-256 hashes but is not digitally signed, so its authenticity relies solely on the underlying TLS channel. In affected versions, TLS certificate validation can be disabled when a proxy is configured, allowing an attacker who can intercept network traffic to supply a malicious update manifest and corresponding package with a matching hash. This can cause the client to download and install a tampered update, resulting in arbitrary code execution with the privileges of the GoSign Desktop user on Windows and macOS, or with elevated privileges on some Linux deployments. A local attacker who can modify proxy settings may also abuse this behavior to escalate privileges by forcing installation of a crafted update.

Project Subscriptions

Vendors Products
Infocert Subscribe
Tinexta Infocert Subscribe
Gosign Desktop Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 31 Dec 2025 02:30:00 +0000

Type Values Removed Values Added
First Time appeared Infocert
Infocert gosign
CPEs cpe:2.3:a:infocert:gosign:*:*:*:*:*:*:*:*
Vendors & Products Infocert
Infocert gosign
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Thu, 20 Nov 2025 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Tinexta Infocert
Tinexta Infocert gosign Desktop
Vendors & Products Tinexta Infocert
Tinexta Infocert gosign Desktop

Tue, 18 Nov 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 18 Nov 2025 16:45:00 +0000

Type Values Removed Values Added
Description GoSign Desktop versions 2.4.0 and earlier use an unsigned update manifest for distributing application updates. The manifest contains package URLs and SHA-256 hashes but is not digitally signed, so its authenticity relies solely on the underlying TLS channel. In affected versions, TLS certificate validation can be disabled when a proxy is configured, allowing an attacker who can intercept network traffic to supply a malicious update manifest and corresponding package with a matching hash. This can cause the client to download and install a tampered update, resulting in arbitrary code execution with the privileges of the GoSign Desktop user on Windows and macOS, or with elevated privileges on some Linux deployments. A local attacker who can modify proxy settings may also abuse this behavior to escalate privileges by forcing installation of a crafted update.
Title GoSign Desktop < 2.4.1 Insecure Update Mechanism RCE
Weaknesses CWE-347
References
Metrics cvssV4_0

{'score': 7, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-11-18T18:24:11.777Z

Reserved: 2025-04-15T19:15:22.585Z

Link: CVE-2025-34324

cve-icon Vulnrichment

Updated: 2025-11-18T18:24:01.521Z

cve-icon NVD

Status : Analyzed

Published: 2025-11-18T17:16:00.923

Modified: 2025-12-31T02:19:33.927

Link: CVE-2025-34324

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-11-20T10:30:50Z

Weaknesses