Timestamping Vulnerability in rfc3161-client by Trail of Bits
CVE-2025-52556

9.3CRITICAL

Key Information:

Vendor
CVE Published:
21 June 2025

What is CVE-2025-52556?

The rfc3161-client, a Python library implementing the Time-Stamp Protocol, has a flaw in its timestamp response signature verification logic prior to version 1.0.3. The vulnerability allows an attacker to manipulate timestamp responses, as the library incorrectly verifies the signature of timestamping leaf certificates against the trusted root certificates. This results in the potential for attackers to introduce malicious timestamp response signatures that could bypass validation, undermining the reliability of the timestamping process.

Affected Version(s)

rfc3161-client < 1.0.3

References

CVSS V4

Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-52556 : Timestamping Vulnerability in rfc3161-client by Trail of Bits