A security fix is now available for Step CA that resolves a vulnerability affecting deployments configured with the SSHPOP provisioner.
All operators running these provisioners should upgrade to the latest release (v0.29.0) immediately.
The issue was discovered and responsibly disclosed by a research team during a security review. There is no evidence of active exploitation.
To limit exploitation risk during a coordinated disclosure window, we are withholding detailed technical information for now. A full write-up will be published in several weeks.
If your organization runs Step CA in production and would like advance, embargoed notification of future security updates, visit https://u.step.sm/disclosure to request inclusion on our embargo list.
This issue was identified and reported by Gabriel Departout and Andy Russon, from AMOSSYS. This audit was sponsored by ANSSI (French Cybersecurity Agency) based on their Open-Source security audit program.
Stay safe, and thank you for helping us keep the ecosystem secure.
{
"github_reviewed": true,
"nvd_published_at": null,
"github_reviewed_at": "2025-12-03T16:27:59Z",
"severity": "MODERATE",
"cwe_ids": [
"CWE-285",
"CWE-863"
]
}