Description
Mod_gnutls is a TLS module for Apache HTTPD based on GnuTLS. Prior to version 0.13.0, code for client certificate verification did not check the key purpose as set in the Extended Key Usage extension. An attacker with access to the private key for a valid certificate issued by a CA trusted for TLS client authentication but designated for a different purpose could have used that certificate to improperly access resources requiring TLS client authentication. Server configurations that do not use client certificates (`GnuTLSClientVerify ignore`, the default) are not affected. The problem has been fixed in version 0.13.0 by rewriting certificate verification to use `gnutls_certificate_verify_peers()`, and requiring key purpose id-kp-clientAuth (also known as `tls_www_client` in GnuTLS) by default if the Extended Key Usage extension is present. The new `GnuTLSClientKeyPurpose` option allows overriding the expected key purpose if needed (please see the manual for details). Behavior for certificates without an Extended Key Usage extension is unchanged. If dedicated (sub-)CAs are used for issuing TLS client certificates only (not for any other purposes) the issue has no practical impact.
Published: 2026-03-24
Score: 6.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: TLS client authentication bypass
Action: Patch immediately
AI Analysis

Impact

Prior to version 0.13.0, the mod_gnutls module for Apache HTTPD failed to validate the key purpose specified in the Extended Key Usage extension during client certificate verification. An attacker possessing the private key of a certificate issued by a CA trusted for TLS client authentication but intended for another purpose could present that certificate during a TLS handshake, causing the server to accept it and grant access to resources protected by client‑certificate verification. This results in an unauthorized bypass of authentication, potentially compromising confidentiality and integrity of data accessed through such resources.

Affected Systems

The vulnerability impacts all releases of the Airtower‑Luna mod_gnutls module prior to 0.13.0. Server configurations that do not enforce client certificate verification (e.g., GnuTLSClientVerify set to ignore, which is the default) are not affected. If a deployment uses dedicated CAs that issue only client authentication certificates, the flaw poses no practical risk.

Risk and Exploitability

The CVSS score of 6.8 indicates a medium severity vulnerability with potential for significant impact if client certificate verification is in use. The EPSS score is below 1%, suggesting limited exploitation activity to date, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires the attacker to control a certificate issued for an alternative purpose by a trusted CA, and the server to require client authentication. For organizations that rely on client certificates for access control, prompt remediation is advisable to mitigate the risk of unauthorized access.

Generated by OpenCVE AI on March 24, 2026 at 20:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade mod_gnutls to version 0.13.0 or later to restore proper key‑purpose checks and use gnutls_certificate_verify_peers() instead of custom code.
  • If an upgrade cannot be performed immediately, configure the GnuTLSClientKeyPurpose option to explicitly require the clientAuth (id‑kp‑clientAuth) key purpose and verify that the CA chain used for client authentication does not include certificates issued for other purposes.
  • Review server configurations to ensure client certificate verification is only enabled when necessary; disable GnuTLSClientVerify when client authentication is not required.
  • Stay informed of updates from the mod_gnutls project and apply security patches as soon as they become available.

Generated by OpenCVE AI on March 24, 2026 at 20:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Mod Gnutls Project
Mod Gnutls Project mod Gnutls
CPEs cpe:2.3:a:mod_gnutls_project:mod_gnutls:*:*:*:*:*:*:*:*
Vendors & Products Mod Gnutls Project
Mod Gnutls Project mod Gnutls

Tue, 24 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Airtower-luna
Airtower-luna mod Gnutls
Vendors & Products Airtower-luna
Airtower-luna mod Gnutls

Tue, 24 Mar 2026 02:30:00 +0000

Type Values Removed Values Added
Description Mod_gnutls is a TLS module for Apache HTTPD based on GnuTLS. Prior to version 0.13.0, code for client certificate verification did not check the key purpose as set in the Extended Key Usage extension. An attacker with access to the private key for a valid certificate issued by a CA trusted for TLS client authentication but designated for a different purpose could have used that certificate to improperly access resources requiring TLS client authentication. Server configurations that do not use client certificates (`GnuTLSClientVerify ignore`, the default) are not affected. The problem has been fixed in version 0.13.0 by rewriting certificate verification to use `gnutls_certificate_verify_peers()`, and requiring key purpose id-kp-clientAuth (also known as `tls_www_client` in GnuTLS) by default if the Extended Key Usage extension is present. The new `GnuTLSClientKeyPurpose` option allows overriding the expected key purpose if needed (please see the manual for details). Behavior for certificates without an Extended Key Usage extension is unchanged. If dedicated (sub-)CAs are used for issuing TLS client certificates only (not for any other purposes) the issue has no practical impact.
Title mod_gnutls missing key purpose check in client certificate verification
Weaknesses CWE-295
References
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N'}


Subscriptions

Airtower-luna Mod Gnutls
Mod Gnutls Project Mod Gnutls
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-24T13:34:05.647Z

Reserved: 2026-03-18T21:23:36.675Z

Link: CVE-2026-33308

cve-icon Vulnrichment

Updated: 2026-03-24T13:33:59.048Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-24T03:16:06.080

Modified: 2026-03-24T19:28:16.217

Link: CVE-2026-33308

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T20:40:30Z

Weaknesses