Impact
A flaw in Botan's handling of name constraints allows a certificate with a mixed‑case Common Name and no Subject Alternative Name to bypass DNS excludedSubtrees restrictions. The library performs a case‑sensitive comparison during path validation, which is incorrect per RFC 5280. Consequently, an attacker can issue a certificate that appears valid to the library while violating the intended name constraint policy, enabling potential impersonation or fraud.
Affected Systems
This issue affects the Randombit Botan C++ cryptography library in all releases prior to version 3.11.0. Software that incorporates Botan without upgrading may be vulnerable if it validates X.509 certificates with name constraints.
Risk and Exploitability
The vulnerability carries a CVSS score of 5.9, indicating moderate severity. EPSS data is not available, and it is not listed in the CISA KEV catalog. The attack vector is inferred to be remote: an adversary can simply submit a specially crafted certificate to an application that performs certificate path validation using Botan. Because the flaw lies in the library's internal logic, no additional conditions are required beyond the presence of name constraints and a CN with mixed case.
OpenCVE Enrichment