Step CA Has Authorization Bypass in ACME and SCEP Provisioners
Critical severity
GitHub Reviewed
Published
Dec 3, 2025
in
smallstep/certificates
•
Updated Dec 3, 2025
Package
Affected versions
<= 0.28.4
Patched versions
0.29.0
Description
Published to the GitHub Advisory Database
Dec 3, 2025
Reviewed
Dec 3, 2025
Last updated
Dec 3, 2025
Summary
A security fix is now available for Step CA that resolves a vulnerability affecting deployments configured with ACME and/or SCEP provisioners.
All operators running these provisioners should upgrade to the latest release (
v0.29.0) immediately.The issue was discovered and disclosed by a research team during a security review. There is no evidence of active exploitation.
To limit exploitation risk during a coordinated disclosure window, we are withholding detailed technical information for now. A full write-up will be published in several weeks.
Embargo List
If your organization runs Step CA in production and would like advance, embargoed notification of future security updates, visit https://u.step.sm/disclosure to request inclusion on our embargo list.
Acknowledgements
This issue was identified and reported by Stephen Kubik of the Cisco Advanced Security Initiatives Group (ASIG)
Stay safe, and thank you for helping us keep the ecosystem secure.
References