{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-23991","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-01-19T18:49:20.657Z","datePublished":"2026-01-22T02:16:37.294Z","dateUpdated":"2026-01-22T15:35:31.770Z"},"containers":{"cna":{"title":"go-tuf affected by client DoS via malformed server response","problemTypes":[{"descriptions":[{"cweId":"CWE-617","lang":"en","description":"CWE-617: Reachable Assertion","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-754","lang":"en","description":"CWE-754: Improper Check for Unusual or Exceptional Conditions","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":5.9,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}}],"references":[{"name":"https://github.com/theupdateframework/go-tuf/security/advisories/GHSA-846p-jg2w-w324","tags":["x_refsource_CONFIRM"],"url":"https://github.com/theupdateframework/go-tuf/security/advisories/GHSA-846p-jg2w-w324"},{"name":"https://github.com/theupdateframework/go-tuf/commit/73345ab6b0eb7e59d525dac17a428f043074cef6","tags":["x_refsource_MISC"],"url":"https://github.com/theupdateframework/go-tuf/commit/73345ab6b0eb7e59d525dac17a428f043074cef6"},{"name":"https://github.com/theupdateframework/go-tuf/releases/tag/v2.3.1","tags":["x_refsource_MISC"],"url":"https://github.com/theupdateframework/go-tuf/releases/tag/v2.3.1"}],"affected":[{"vendor":"theupdateframework","product":"go-tuf","versions":[{"version":">= 2.0.0, < 2.3.1","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-01-22T02:17:50.311Z"},"descriptions":[{"lang":"en","value":"go-tuf is a Go implementation of The Update Framework (TUF). Starting in version 2.0.0 and prior to version 2.3.1, if the TUF repository (or any of its mirrors) returns invalid TUF metadata JSON (valid JSON but not well formed TUF metadata), the client will panic during parsing, causing a denial of service. The panic happens before any signature is validated. This means that a compromised repository/mirror/cache can DoS clients without having access to any signing key. Version 2.3.1 fixes the issue. No known workarounds are available."}],"source":{"advisory":"GHSA-846p-jg2w-w324","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-22T15:24:15.603757Z","id":"CVE-2026-23991","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-22T15:35:31.770Z"}}]}}