CVE-2026-33753

medium Red Hat
CVSS v3 Base Score
6.2
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Attack Characteristics
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Confidentiality
None
Integrity
High
Availability
None
Published: April 8, 2026 (36 days ago)
Last Modified: April 8, 2026
Vendor: Red Hat
Source: REDHAT

Description

A flaw was found in rfc3161-client, a Python library implementing the Time-Stamp Protocol (TSP). This authorization bypass vulnerability allows a remote attacker to impersonate a trusted TimeStamping Authority (TSA). The flaw exists in the library's signature verification process, specifically in how it extracts certificates from a PKCS#7 bag (a standard for cryptographic messages). An attacker can exploit a logic error to present a forged certificate, leading the library to incorrectly validate authorization rules and bypass intended TSA authorization pinning.

CWE

CWE-295

Affected Products

Red Hat Trusted Artifact Signer

References