CVE-2022-43705
NixOS vulnerability analysis and mitigation

Overview

CVE-2022-43705 affects Botan versions before 2.19.3, where it is possible to forge OCSP (Online Certificate Status Protocol) responses due to a certificate verification error. This vulnerability was introduced in Botan 1.11.34 (November 2016) and was disclosed in November 2022. Botan is a cryptographic library implementation, and this vulnerability specifically impacts its certificate validation functionality (NVD, GitHub Advisory).

Technical details

The vulnerability stems from a failure to verify that an authorized responder certificate embedded in an OCSP response is authorized by the issuing CA. When validating OCSP responses, the system should verify that responder certificates are authorized by the CA, but versions 2.19.2 and older failed to perform this verification. This allowed any valid signature by an embedded certificate to pass the check and make claims about the revocation status of certificates of any CA. The vulnerability has been assigned a CVSS v3.1 base score of 9.1 (Critical) with vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N (NVD).

Impact

Attackers in a position to spoof OCSP responses could exploit this vulnerability to render legitimate certificates of a third-party CA as revoked or use a compromised (and actually revoked) certificate by spoofing an OCSP-'OK' response. For example, an attacker could impersonate a legitimate TLS server using a compromised certificate and bypass the revocation check using OCSP stapling (GitHub Advisory).

Mitigation and workarounds

The issue has been patched in Botan version 2.19.3, with a comprehensive fix planned for version 3.0.0. As a workaround, users can manually verify that OCSP responses were signed by the legitimate CA certificate that issued the certificate in question, effectively forbidding authorized certificates altogether. Users who do not rely on OCSP for certificate revocation checks are not affected, and temporarily switching to CRLs for revocation checks might be a viable alternative (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management