Time Travelers & Zombie Chains: Deep Dive into CVE-2026-24122 in Sigstore Cosign
Vulnerability ID: CVE-2026-24122
CVSS Score: 3.7
Published: 2026-02-19
A temporal logic flaw in Sigstore Cosign's certificate validation allowed expired intermediate Certificate Authorities to validate signatures if the leaf certificate was issued before the parent's expiration. While low severity for the public Sigstore infrastructure due to ephemeral certificates, this flaw exposes private PKI deployments to 'Zombie Cert' attacks.
TL;DR
Cosign checked the validity of CA chains based on the leaf certificate's issuance time rather than the signature time. This allowed expired Intermediate CAs to validly sign artifacts, provided the leaf cert was created while the parent was still alive.
Technical Details
- CWE ID: CWE-295
- Attack Vector: Network
- CVSS v3.1: 3.7 (Low)
- Complexity: High
- Privileges Required: None
- Exploit Status: Theoretical / PoC
Affected Systems
- sigstore/cosign < v3.0.5
- Internal/Private Sigstore deployments using custom PKI
- CI/CD pipelines relying on Cosign for artifact verification
-
sigstore/cosign: < 3.0.5 (Fixed in:
3.0.5)
Code Analysis
Commit: 3c9a736
Verify validity of chain rather than just certificate
x509.VerifyOptions{ CurrentTime: signatureTimestamp } // Replaces leaf.NotBefore
Exploit Details
- N/A: Theoretical exploit requiring specific PKI conditions (Intermediate expiring before Leaf).
Mitigation Strategies
- Upgrade Cosign to v3.0.5 immediately.
- Rebuild any internal tooling that imports
github.com/sigstore/cosignas a library. - Audit internal PKI to ensure Intermediate CAs do not have expiration dates that fall within the validity period of their issued leaf certificates.
Remediation Steps:
- Download the latest release binary from the Sigstore GitHub releases page.
- Verify the binary checksum.
- Replace the existing
cosignbinary in your CI/CD pipelines. - If using as a Go library: update
go.modto requiregithub.com/sigstore/cosign/v2 v2.4.0(or v3.0.5 equivalent) and rungo mod tidy.
References
Read the full report for CVE-2026-24122 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)