Authentication mechanism absence or evasion In github.com/smallstep/certificates
Ecosystem | Package | Affected version | Patched versions |
|---|---|---|---|
go default | github.com/smallstep/certificates | 0.29.0 |
Description
Step CA Has Authorization Bypass in ACME and SCEP Provisioners
Summary
A security fix is now available for Step CA that resolves a vulnerability affecting deployments configured with ACME and/or SCEP provisioners.
All operators running these provisioners should upgrade to the latest release (v0.29.0) immediately.
The issue was discovered and disclosed by a research team during a security review. There is no evidence of active exploitation.
To limit exploitation risk during a coordinated disclosure window, we are withholding detailed technical information for now. A full write-up will be published in several weeks.
Embargo List
If your organization runs Step CA in production and would like advance, embargoed notification of future security updates, visit https://u.step.sm/disclosure to request inclusion on our embargo list.
Acknowledgements
This issue was identified and reported by Stephen Kubik of the Cisco Advanced Security Initiatives Group (ASIG)
Stay safe, and thank you for helping us keep the ecosystem secure.
Mitigation
• go github.com/smallstep/certificates: Upgrade to version(s) 0.29.0 or higher.
References
• GitHub Advisory DatabaseSeverity v4.0
8.1
High
Fluid Attacks ID
FLAT-MWV0E
CVE ID
CVE-2025-44005CWE ID(s)
CWE-306Alternative ID
GHSA-h8cp-697h-8c8p
EPSS
N/A
Percentile
N/A
Source
GitHub Advisory Database
Does your application use this vulnerable software?
During the free trial, our tools assess your application, identify vulnerabilities, and provide recommendations for their remediation.