CVE-2024-45341
cAdvisor vulnerability analysis and mitigation

Overview

A certificate with a URI which has a IPv6 address with a zone ID may incorrectly satisfy a URI name constraint that applies to the certificate chain. This vulnerability, identified as CVE-2024-45341, was discovered in January 2025 and affects the crypto/x509 package of the Golang standard library. The issue specifically impacts private PKIs that use URIs, as certificates containing URIs are not permitted in the web PKI (NVD, Go Issue).

Technical details

The vulnerability exists in the certificate validation process where IPv6 addresses containing zone IDs in URIs could bypass URI name constraints in the certificate chain. The issue has been assigned a CVSS v3.1 Base Score of 6.1 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N (NVD).

Impact

The vulnerability only affects users of private PKIs which make use of URIs in their certificates. Since certificates containing URIs are not permitted in the web PKI, the impact is limited to private certificate deployments (Debian Tracker).

Mitigation and workarounds

The issue has been fixed in Go versions 1.22.11, 1.23.5, and 1.24.0-rc2. Users are advised to upgrade to these versions or later to address the vulnerability. The fixes were implemented through commits in the Go codebase (Go Dev).

Community reactions

The vulnerability was responsibly disclosed by Juho Forsén of Mattermost. The Go team promptly addressed the issue by releasing security updates across multiple versions of the language (Go Dev).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management