CVE-2026-33753
mediumCVSS v3 Base Score
6.2
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Attack Characteristics
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Confidentiality
None
Integrity
High
Availability
None
Vulnerability Report
Generated by CyberWatcher
Description
A flaw was found in rfc3161-client, a Python library implementing the Time-Stamp Protocol (TSP). This authorization bypass vulnerability allows a remote attacker to impersonate a trusted TimeStamping Authority (TSA). The flaw exists in the library's signature verification process, specifically in how it extracts certificates from a PKCS#7 bag (a standard for cryptographic messages). An attacker can exploit a logic error to present a forged certificate, leading the library to incorrectly validate authorization rules and bypass intended TSA authorization pinning.
CWE
CWE-295Affected Products
Red Hat Trusted Artifact Signer