Improper Certificate Validation Affecting github.com/in-toto/go-witness/attestation/aws-iid package, versions <0.9.0


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.02% (5th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMINTOTOGOWITNESSATTESTATIONAWSIID-13569624
  • published16 Oct 2025
  • disclosed15 Oct 2025
  • creditUnknown

Introduced: 15 Oct 2025

NewCVE-2025-62375  (opens in a new tab)
CWE-295  (opens in a new tab)

How to fix?

Upgrade github.com/in-toto/go-witness/attestation/aws-iid to version 0.9.0 or higher.

Overview

Affected versions of this package are vulnerable to Improper Certificate Validation via improper verification of AWS EC2 identity documents in the aws-iid process. An attacker can cause the system to accept forged identity documents by providing documents with missing or invalid signatures, or by exploiting failures in RSA verification. This is only exploitable if the AWS attestor is used and the system relies on the hard-coded certificate without additional trusted data for region validation.

Workaround

This vulnerability can be mitigated by manually verifying the identity documents and signatures using the openssl command line as documented by AWS.

CVSS Base Scores

version 4.0
version 3.1