Description
Oxia is a metadata store and coordination system. Prior to 0.16.2, the trustedCertPool() function in the TLS configuration only parses the first PEM block from CA certificate files. When a CA bundle contains multiple certificates (e.g., intermediate + root CA), only the first certificate is loaded. This silently breaks certificate chain validation for mTLS. This vulnerability is fixed in 0.16.2.
Published: 2026-04-21
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Disruption of Mutual TLS Authentication
Action: Apply Patch
AI Analysis

Impact

The vulnerability stems from the trustedCertPool() function in Oxia, which, in versions prior to 0.16.2, only parses the first PEM block of a CA certificate file. When a certificate bundle contains multiple PEM blocks—such as an intermediate and a root certificate—the additional certificates are ignored, causing certificate chain validation to silently fail. This flaw is a certificate validation weakness (CWE-295) that can lead to the failure of mutual TLS authentication for legitimate connections, effectively disabling a critical security mechanism and resulting in a loss of availability for services that rely on mTLS.

Affected Systems

Oxia, a metadata store and coordination system developed by oxia-db, is affected in all releases before version 0.16.2. The vulnerability arises from the TLS configuration when multi‑certificate PEM bundles are used.

Risk and Exploitability

The CVSS score of 6.9 indicates a high‑moderate severity, and the exploit probability is not available, though the vulnerability is not listed in the CISA KEV catalog. An attacker could exploit this flaw via remote network traffic by presenting a multi‑certificate PEM bundle to an Oxia instance; the server would silently reject the chain, causing denial‑of‑service conditions for mutual TLS‑protected endpoints. There is no code execution vector or direct elevation of privileges reported. The risk is primarily associated with availability and authentication failure rather than confidentiality or integrity.

Generated by OpenCVE AI on April 22, 2026 at 06:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Oxia to version 0.16.2 or later to include the fixed trustedCertPool() logic.
  • Verify that the TLS certificate bundle contains only one PEM block or that multi‑certificate bundles are correctly parsed after the upgrade; remove unused certificates if necessary.
  • If an upgrade is not immediately possible, decline mTLS traffic until the issue is resolved to prevent service disruption.

Generated by OpenCVE AI on April 22, 2026 at 06:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Oxia-db
Oxia-db oxia
Vendors & Products Oxia-db
Oxia-db oxia

Wed, 22 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description Oxia is a metadata store and coordination system. Prior to 0.16.2, the trustedCertPool() function in the TLS configuration only parses the first PEM block from CA certificate files. When a CA bundle contains multiple certificates (e.g., intermediate + root CA), only the first certificate is loaded. This silently breaks certificate chain validation for mTLS. This vulnerability is fixed in 0.16.2.
Title Oxia: TLS CA certificate chain validation fails with multi-certificate PEM bundles
Weaknesses CWE-295
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-22T13:18:32.925Z

Reserved: 2026-04-15T20:40:15.519Z

Link: CVE-2026-40944

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-21T22:16:19.980

Modified: 2026-04-21T22:16:19.980

Link: CVE-2026-40944

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T11:44:59Z

Weaknesses