<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Oviva AG — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/oviva-ag/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/oviva-ag/feed.xml" rel="self" type="application/rss+xml"/><item><title>epa4all-client Signature Verification Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-epa4all-signature-bypass/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-epa4all-signature-bypass/</guid><description>epa4all-client is vulnerable to a signature verification bypass where the ECDSA signature verification discards the boolean return value, allowing any structurally valid signature to be considered trusted.</description><content:encoded><![CDATA[<p>The <code>epa4all-client</code> software, specifically versions 1.2.0 and earlier, contains a critical vulnerability related to signature verification. The vulnerability resides in the <code>SignedPublicKeysTrustValidatorImpl.isTrusted()</code> method, where the return value of the <code>Signature.verify()</code> function, which indicates whether the signature matches, is ignored. This oversight means that any structurally valid signature, regardless of its authenticity, will be accepted as valid. This allows attackers to bypass signature validation checks. This vulnerability has been assigned CVE-2026-44900 and patched in pull request #34.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious update or component for <code>epa4all-client</code>.</li>
<li>The attacker signs the malicious component with any structurally valid signature (even if it&rsquo;s not cryptographically correct).</li>
<li>The compromised <code>epa4all-client</code> application receives the crafted, signed component.</li>
<li>The <code>SignedPublicKeysTrustValidatorImpl.isTrusted()</code> method is invoked to verify the signature of the component.</li>
<li>The <code>Signature.verify()</code> method is called, but its boolean return value is discarded.</li>
<li>Because the signature is structurally valid, the method proceeds as if the signature is authentic.</li>
<li>The malicious component is accepted and executed by the <code>epa4all-client</code> application.</li>
<li>The attacker achieves arbitrary code execution, potentially leading to data compromise or system takeover.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to bypass signature validation, leading to the execution of malicious code within the <code>epa4all-client</code> application. This can lead to a complete compromise of the application, potentially affecting sensitive data handled by the client. The vulnerability affects versions 1.2.0 and earlier, potentially impacting all users of these versions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to the patched version of <code>epa4all-client</code> referenced in <a href="https://github.com/oviva-ag/epa4all-client/pull/34">#34</a> to remediate the signature bypass vulnerability.</li>
<li>Deploy the Sigma rule &ldquo;Detect epa4all-client Signature Verification Bypass&rdquo; to monitor for potential exploitation attempts.</li>
<li>Monitor network traffic for unusual activity originating from <code>epa4all-client</code> processes after upgrades, as this could indicate a compromised installation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>signature-bypass</category><category>vulnerability</category></item></channel></rss>