FKIE_CVE-2026-33308

Vulnerability from fkie_nvd - Published: 2026-03-24 03:16 - Updated: 2026-03-24 19:28
Summary
Mod_gnutls is a TLS module for Apache HTTPD based on GnuTLS. Prior to version 0.13.0, code for client certificate verification did not check the key purpose as set in the Extended Key Usage extension. An attacker with access to the private key for a valid certificate issued by a CA trusted for TLS client authentication but designated for a different purpose could have used that certificate to improperly access resources requiring TLS client authentication. Server configurations that do not use client certificates (`GnuTLSClientVerify ignore`, the default) are not affected. The problem has been fixed in version 0.13.0 by rewriting certificate verification to use `gnutls_certificate_verify_peers()`, and requiring key purpose id-kp-clientAuth (also known as `tls_www_client` in GnuTLS) by default if the Extended Key Usage extension is present. The new `GnuTLSClientKeyPurpose` option allows overriding the expected key purpose if needed (please see the manual for details). Behavior for certificates without an Extended Key Usage extension is unchanged. If dedicated (sub-)CAs are used for issuing TLS client certificates only (not for any other purposes) the issue has no practical impact.
Impacted products
Vendor Product Version
mod_gnutls_project mod_gnutls *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mod_gnutls_project:mod_gnutls:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E476F8C2-BB73-4776-A192-67E20C9CE6EC",
              "versionEndExcluding": "0.13.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Mod_gnutls is a TLS module for Apache HTTPD based on GnuTLS. Prior to version 0.13.0, code for client certificate verification did not check the key purpose as set in the Extended Key Usage extension. An attacker with access to the private key for a valid certificate issued by a CA trusted for TLS client authentication but designated for a different purpose could have used that certificate to improperly access resources requiring TLS client authentication. Server configurations that do not use client certificates (`GnuTLSClientVerify ignore`, the default) are not affected. The problem has been fixed in version 0.13.0 by rewriting certificate verification to use `gnutls_certificate_verify_peers()`, and requiring key purpose id-kp-clientAuth (also known as `tls_www_client` in GnuTLS) by default if the Extended Key Usage extension is present. The new `GnuTLSClientKeyPurpose` option allows overriding the expected key purpose if needed (please see the manual for details). Behavior for certificates without an Extended Key Usage extension is unchanged. If dedicated (sub-)CAs are used for issuing TLS client certificates only (not for any other purposes) the issue has no practical impact."
    },
    {
      "lang": "es",
      "value": "Mod_gnutls es un m\u00f3dulo TLS para Apache HTTPD basado en GnuTLS. Antes de la versi\u00f3n 0.13.0, el c\u00f3digo para la verificaci\u00f3n de certificados de cliente no verificaba el prop\u00f3sito de la clave tal como se establece en la extensi\u00f3n de Uso Extendido de Clave. Un atacante con acceso a la clave privada de un certificado v\u00e1lido emitido por una CA de confianza para la autenticaci\u00f3n de cliente TLS pero designado para un prop\u00f3sito diferente podr\u00eda haber utilizado ese certificado para acceder indebidamente a recursos que requieren autenticaci\u00f3n de cliente TLS. Las configuraciones de servidor que no utilizan certificados de cliente (\u0027GnuTLSClientVerify ignore\u0027, el valor predeterminado) no se ven afectadas. El problema se ha solucionado en la versi\u00f3n 0.13.0 reescribiendo la verificaci\u00f3n de certificados para usar \u0027gnutls_certificate_verify_peers()\u0027 y requiriendo el prop\u00f3sito de clave id-kp-clientAuth (tambi\u00e9n conocido como \u0027tls_www_client\u0027 en GnuTLS) por defecto si la extensi\u00f3n de Uso Extendido de Clave est\u00e1 presente. La nueva opci\u00f3n \u0027GnuTLSClientKeyPurpose\u0027 permite anular el prop\u00f3sito de clave esperado si es necesario (consulte el manual para m\u00e1s detalles). El comportamiento para certificados sin una extensi\u00f3n de Uso Extendido de Clave no ha cambiado. Si se utilizan CA (o sub-CA) dedicadas solo para emitir certificados de cliente TLS (no para ning\u00fan otro prop\u00f3sito), el problema no tiene impacto pr\u00e1ctico."
    }
  ],
  "id": "CVE-2026-33308",
  "lastModified": "2026-03-24T19:28:16.217",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 4.0,
        "source": "security-advisories@github.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2026-03-24T03:16:06.080",
  "references": [
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://github.com/airtower-luna/mod_gnutls/security/advisories/GHSA-hm2g-m958-8qgh"
    }
  ],
  "sourceIdentifier": "security-advisories@github.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-295"
        }
      ],
      "source": "security-advisories@github.com",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…