CVE-2023-37920
Python vulnerability analysis and mitigation

Overview

CVE-2023-37920 affects Certifi, a curated collection of Root Certificates for validating SSL certificates and TLS host identity verification. The vulnerability was discovered in versions from 2015.04.28 to 2023.07.22, specifically related to the recognition of 'e-Tugra' root certificates, which were subject to an investigation due to reported security issues in their systems (GitHub Advisory, Mozilla Discussion).

Technical details

The vulnerability has been assigned a CVSS v3.1 base score of 9.8 (CRITICAL) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The issue stems from the inclusion of e-Tugra root certificates in the trust store, which were later found to have significant security concerns in their systems. The vulnerability is classified under CWE-345 (Insufficient Verification of Data Authenticity) (NVD).

Impact

The vulnerability could potentially lead to the disclosure of sensitive information, addition or modification of data, or Denial of Service (DoS). The impact is particularly significant given that Certifi is widely used for SSL certificate validation in various applications and systems (NetApp Advisory).

Mitigation and workarounds

The vulnerability has been addressed in Certifi version 2023.07.22, which removes the e-Tugra root certificates from the root store. Users are advised to upgrade to this version or later to mitigate the vulnerability (GitHub Patch).

Community reactions

Mozilla and other major browser vendors have taken action regarding e-Tugra certificates. Google Chrome announced the removal of e-Tugra root certificates from their Root Store, and Apple confirmed these certificates were not present in their Root Store. The security community has generally supported these actions given the severity of the security concerns (Mozilla Discussion).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management