CVE-2025-70888
Published: 25 March 2026
Description
An issue in mtrojnar Osslsigncode affected at v2.10 and before allows a remote attacker to escalate privileges via the osslsigncode.c component
Mitigating Controls (NIST 800-53 r5)AI
Flaw remediation requires updating osslsigncode to a patched version beyond v2.10, directly eliminating the privilege escalation vulnerability.
Least privilege enforcement ensures the osslsigncode process runs with minimal necessary privileges, preventing successful escalation to higher privileges.
Software usage restrictions prohibit deployment or execution of vulnerable osslsigncode versions v2.10 and earlier on systems.
Security SummaryAI
CVE-2025-70888 is a critical vulnerability in the osslsigncode tool developed by mtrojnar, affecting versions 2.10 and earlier. The issue resides in the osslsigncode.c component and stems from improper privilege management (CWE-269), earning a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Published on March 25, 2026, it enables a remote attacker to escalate privileges when the tool is used for signing binaries or related cryptographic operations.
A remote, unauthenticated attacker can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation allows full compromise of the affected system, granting high-impact access to confidentiality, integrity, and availability through privilege escalation from the tool's execution context.
Mitigation details are available in upstream repositories, including GitHub issue #475 and pull request #477 in the mtrojnar/osslsigncode project, which address the flaw. A related discussion appears in ralphje/signify issue #60. Security practitioners should update to a version incorporating the fix from PR #477 and audit uses of osslsigncode in signing workflows.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE-2025-70888 is a remote, unauthenticated privilege escalation vulnerability (AV:N/AC:L/PR:N), directly enabling T1068 (Exploitation for Privilege Escalation) and facilitating initial access via T1190 (Exploit Public-Facing Application).