CVE-2023-46737
NixOS vulnerability analysis and mitigation

Overview

Cosign, a sigstore signing tool for OCI containers, was found to be vulnerable to a denial of service attack (CVE-2023-46737) discovered in November 2023. The vulnerability affects versions up to and including 2.2.0, with a patch available in version 2.2.1. The issue allows an attacker who controls a remote registry to return a high number of attestations and/or signatures to Cosign, causing it to enter a long loop resulting in an endless data attack (GitHub Advisory).

Technical details

The vulnerability stems from an unchecked loop in Cosign's pkg/cosign.FetchAttestations function that processes all attestations fetched from the remote registry. The root cause is that Cosign did not implement any limits on the number of attestations it would process, making it susceptible to an endless data attack. The vulnerability has been assigned a CVSS v3.1 base score of 3.1 (LOW) with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L, indicating network attack vector with high complexity, no privileges required, and user interaction required (GitHub Advisory).

Impact

The vulnerability can be exploited to cause a denial of service condition, preventing users from verifying their data. In specific scenarios, such as in Kyverno's case, an attacker with limited cluster access privileges can trigger the infinite loop by making a request with an image reference to their controlled registry, effectively denying other users from completing their admission requests. The attack could also be used as a type of rollback attack to prevent security upgrades by causing Cosign to get stuck in an infinite loop (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in Cosign version 2.2.1. The fix implements a simple limit on the number of attestations that Cosign will process, preventing the endless data attack while maintaining functionality for the vast majority of use cases. Users are advised to upgrade to version 2.2.1 or later (GitHub Advisory, GitHub Patch).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-14330CRITICAL9.8
  • NixOSNixOS
  • cpe:2.3:a:mozilla:firefox_esr
NoYesDec 09, 2025
CVE-2025-14329HIGH8.8
  • NixOSNixOS
  • cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*
NoYesDec 09, 2025
CVE-2025-14333HIGH8.1
  • NixOSNixOS
  • firefox
NoYesDec 09, 2025
CVE-2025-14332HIGH7.3
  • NixOSNixOS
  • firefox
NoYesDec 09, 2025
CVE-2025-14331MEDIUM6.5
  • NixOSNixOS
  • firefox
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management