Description
rfc3161-client is a Python library implementing the Time-Stamp Protocol (TSP) described in RFC 3161. Prior to 1.0.6, an Authorization Bypass vulnerability in rfc3161-client's signature verification allows any attacker to impersonate a trusted TimeStamping Authority (TSA). By exploiting a logic flaw in how the library extracts the leaf certificate from an unordered PKCS#7 bag of certificates, an attacker can append a spoofed certificate matching the target common_name and Extended Key Usage (EKU) requirements. This tricks the library into verifying these authorization rules against the forged certificate while validating the cryptographic signature against an actual trusted TSA (such as FreeTSA), thereby bypassing the intended TSA authorization pinning entirely. This vulnerability is fixed in 1.0.6.
Published: 2026-04-08
Score: 6.2 Medium
EPSS: n/a
KEV: No
Impact: TSA impersonation via authorization bypass
Action: Immediate Patch
AI Analysis

Impact

A logic flaw in rfc3161-client's extraction of the leaf certificate from an unordered PKCS#7 bag allows an attacker to forge a certificate that matches the required common name and Extended Key Usage attributes. The library then verifies the authorization rules against the forged certificate while still validating the cryptographic signature against a legitimate trusted TimeStamping Authority. This bypasses the intended TSA authorization pinning and enables an attacker to impersonate a trusted TSA, potentially creating or claiming forged timestamps.

Affected Systems

The vulnerability affects the rfc3161-client library distributed by trailofbits. Any installation of rfc3161-client prior to version 1.0.6 is susceptible. No additional product or version specifics are provided beyond the 1.0.6 release threshold.

Risk and Exploitability

With a CVSS score of 6.2 the weakness presents a moderate severity risk. EPSS data is not available and the vulnerability is not listed in the CISA KEV catalog, indicating a lower public exploitation footprint. The attack likely requires control over the PKCS#7 signature input, allowing an attacker to inject a crafted certificate chain that satisfies the TSA verification logic. Once the forged certificate is accepted, an attacker can forge timestamps that appear valid to downstream consumers of the timestamp service.

Generated by OpenCVE AI on April 8, 2026 at 16:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade rfc3161-client to version 1.0.6 or newer

Generated by OpenCVE AI on April 8, 2026 at 16:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-3xxc-pwj6-jgrj rfc3161-client Has Improper Certificate Validation
History

Thu, 09 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Wed, 08 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Trailofbits
Trailofbits rfc3161-client
Vendors & Products Trailofbits
Trailofbits rfc3161-client

Wed, 08 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
Description rfc3161-client is a Python library implementing the Time-Stamp Protocol (TSP) described in RFC 3161. Prior to 1.0.6, an Authorization Bypass vulnerability in rfc3161-client's signature verification allows any attacker to impersonate a trusted TimeStamping Authority (TSA). By exploiting a logic flaw in how the library extracts the leaf certificate from an unordered PKCS#7 bag of certificates, an attacker can append a spoofed certificate matching the target common_name and Extended Key Usage (EKU) requirements. This tricks the library into verifying these authorization rules against the forged certificate while validating the cryptographic signature against an actual trusted TSA (such as FreeTSA), thereby bypassing the intended TSA authorization pinning entirely. This vulnerability is fixed in 1.0.6.
Title Improper Certificate Validation in rfc3161-client
Weaknesses CWE-295
References
Metrics cvssV3_1

{'score': 6.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}


Subscriptions

Trailofbits Rfc3161-client
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-08T16:12:57.796Z

Reserved: 2026-03-23T18:30:14.125Z

Link: CVE-2026-33753

cve-icon Vulnrichment

Updated: 2026-04-08T16:08:37.157Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-08T16:16:23.670

Modified: 2026-04-08T21:26:13.410

Link: CVE-2026-33753

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-08T14:54:59Z

Links: CVE-2026-33753 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:39:09Z

Weaknesses