Event

TGIT
1/8

Video

IBM
2/8

Quiz

Quiz
3/8

Award

cnapp-v3
4/8

eBook

cnapp-v3
5/8

What's New?

AI icon

Don't just use AI,
Secure AI with AccuKnox AI-SPM!

PRODUCT TOUR
6/8

Blog

mssp

Why is AccuKnox the most MSSP ready CNAPP?

LEARN MORE
7/8

Comparison

Comparison

Searching for Alternative CNAPP?

COMPARE NOW
8/8
CVE-2023-37920

CVE-2023-37920: Critical Vulnerability in Certifi Certificate Management

 |  August 29, 2025

Unpack CVE-2023-37920, a critical certificate management vulnerability in Certifi Python package affecting SSL/TLS validation. Learn how this attack works, its widespread impact, and essential steps to mitigate the risk.

Reading Time: 6 minutes

TL;DR

  • What: CVE-2023-37920 is a certificate trust vulnerability in Certifi affecting versions 2015.04.28 through 2023.07.22.
  • Impact: Potential for man-in-the-middle attacks, certificate spoofing, trust chain manipulation, and exposure of sensitive data.
  • Who’s affected: IBM Cloud Pak, Red Hat systems, NetApp products, and any Python environment using affected Certifi versions.
  • Severity: CVSS 9.8 (Critical)
  • Mitigation: Upgrade to Certifi 2023.07.22+, enforce certificate pinning, and monitor certificate authority trust chains.

CVE-2023-37920 represents a critical security vulnerability that exposed organizations worldwide to potential certificate-based attacks for nearly eight years. This high-severity vulnerability in the widely used Certifi Python package demonstrates how compromised certificate authorities can undermine the entire foundation of secure internet communications, affecting everything from enterprise cloud platforms to individual applications relying on SSL/TLS validation.

What is CVE-2023-37920?

CVE-2023-37920 is a critical vulnerability affecting Certifi, a popular Python package that provides a curated collection of root certificates for SSL certificate validation and TLS host verification. The vulnerability carries a severe CVSS base score of 9.8, reflecting its potential for widespread impact across systems that depend on Certifi for secure communications.

This vulnerability specifically affects Certifi versions from 2015.04.28 through 2023.07.22, representing an extensive eight-year window of exposure. The core issue stems from Certifi’s inclusion of e-Tugra root certificates in its trusted certificate store, which became problematic when e-Tugra’s certificate authority practices came under security investigation.

The vulnerability is classified as network-exploitable with low attack complexity, requiring no authentication or user interaction (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N). This means attackers could potentially exploit the vulnerability remotely without special privileges or user cooperation.

Technical Analysis and Exploitation Details

The technical foundation of CVE-2023-37920 lies in certificate trust chain validation. Certifi maintained e-Tugra root certificates in its trusted root store, automatically validating any certificates issued under e-Tugra’s authority. When security concerns emerged regarding e-Tugra’s certificate management practices, all certificates issued by this authority became potentially compromised.

The vulnerability enables several attack vectors:

  • Man-in-the-middle attacks: Attackers could use compromised e-Tugra certificates to intercept secure communications
  • Certificate spoofing: Malicious certificates could be validated as legitimate, bypassing security controls
  • Trust chain manipulation: The compromised root certificates could validate fraudulent intermediate certificates

The network-based attack vector means exploitation can occur remotely, while the low complexity indicates that sophisticated techniques aren’t required for successful attacks.

Affected Systems and Impact Assessment

The vulnerability impacts a broad range of systems and platforms:

Enterprise Platforms:

  • IBM Cloud Pak for Data System versions 1.0.0.0 through 1.0.8.4
  • NetApp products incorporating Certifi libraries
  • Red Hat systems using python-certifi packages

Potential Consequences:

  • Disclosure of sensitive information transmitted over secure connections
  • Data modification through compromised certificate validation
  • Denial of Service attacks targeting certificate validation processes
  • Business disruption from certificate validation failures

The high integrity impact rating indicates that successful exploitation could allow attackers to modify data in transit without detection, while the confidentiality impact could expose personal data, authentication credentials, and proprietary business information.

Detection and Identification Methods

Organizations can identify vulnerable systems through several approaches:

Version Checking:

  • Verify Certifi installations using Python package management tools
  • Check for versions between 2015.04.28 and 2023.07.22 (exclusive)
  • Review system inventories for applications using affected Certifi versions

Log Analysis:

  • Monitor certificate validation logs for unusual patterns
  • Look for certificate failures related to e-Tugra certificates
  • Analyze SSL/TLS handshake logs for anomalies

Automated Scanning:

  • Deploy vulnerability scanners configured to detect CVE-2023-37920
  • Use dependency checking tools to identify vulnerable Certifi installations
  • Implement continuous monitoring for certificate authority changes

Mitigation Strategies and Remediation

Primary Remediation:
The definitive fix for CVE-2023-37920 is upgrading to Certifi version 2023.07.22 or later. This version removes e-Tugra root certificates from the trusted root store, eliminating the vulnerability.

Platform-Specific Updates:

  • IBM Cloud Pak: Upgrade to version 1.0.9.0 or later
  • Red Hat Systems: Apply vendor-provided patches through standard update channels
  • NetApp Products: Follow vendor-specific guidance for affected systems

Additional Security Measures:

  • Implement certificate pinning where possible
  • Deploy enhanced certificate validation monitoring
  • Establish certificate authority trust policies
  • Regular security assessments of certificate dependencies

Important Note: No workarounds are available for this vulnerability according to vendor security bulletins, making proper patching essential.

Risk Assessment and Business Impact

Risk Assessment and Business Impact

The business implications of CVE-2023-37920 extend beyond technical concerns:

Immediate Risks:

  • Potential for data breaches through compromised secure communications
  • Service disruptions from certificate validation failures
  • Regulatory compliance violations if sensitive data is exposed
compliance detailed view

Long-term Considerations:

  • Reputation damage from security incidents
  • Financial losses from business disruption
  • Legal liability from data protection failures
  • Customer trust erosion following security compromises

The vulnerability’s eight-year exposure window means that organizations may have unknowingly operated with compromised certificate validation for extended periods, potentially affecting historical security assessments and compliance audits.

How AccuKnox Solves CVE-2023-37920

top ai app issues

AccuKnox provides an AI-powered cloud-native security platform that strengthens certificate management and mitigates vulnerabilities like CVE-2023-37920:

  • Certificate Monitoring: Continuously tracks certificate trust chains, ensuring compromised roots are flagged instantly.
  • Runtime Protection: Detects unusual certificate validation patterns during application execution.
  • Policy Enforcement: Implements strict certificate pinning, SNI validation, and least-privilege access for SSL/TLS traffic.
  • Automated Alerts: Provides real-time notifications for MITM attempts or suspicious trust chain manipulations.
  • Integration: Works across Python environments, enterprise cloud platforms, and containerized applications for unified protection.

Request a free risk assessment with AccuKnox to identify and mitigate certificate-based vulnerabilities in your applications.

Conclusion and Key Takeaways

CVE-2023-37920 underscores the critical importance of certificate authority trust management in modern cybersecurity infrastructure. The vulnerability’s high severity rating and extensive version range highlight how foundational security components can harbor long-standing risks that affect entire ecosystems of dependent applications.

Organizations must prioritize immediate patching to Certifi version 2023.07.22 or later while implementing comprehensive certificate management strategies. The rapid disclosure and patching timeline demonstrates the effectiveness of coordinated vulnerability response, but the eight-year exposure period emphasizes the need for proactive security monitoring and regular dependency audits.

Moving forward, security teams should maintain current inventories of certificate management dependencies, implement robust patch management processes, and consider certificate authority security practices as part of their overall risk assessment strategies. The interconnected nature of modern security infrastructure means that vulnerabilities in foundational components like Certifi can have far-reaching implications across entire technology stacks.

This is where solutions like AccuKnox come in. AccuKnox provides runtime visibility, automated certificate monitoring, and Zero Trust enforcement to help organizations detect, prevent, and mitigate certificate-based risks such as CVE-2023-37920. By continuously monitoring certificate trust chains and enforcing proactive security policies, AccuKnox enables businesses to safeguard cloud-native applications against both present and future vulnerabilities.

👉 Schedule a demo with AccuKnox to strengthen your certificate management and protect your infrastructure from similar high-severity threats.

FAQs

1. Which Certifi versions are affected by CVE-2023-37920?

Versions from 2015.04.28 through 2023.07.22 are vulnerable.

2. Can attackers exploit this vulnerability remotely?

Yes, the vulnerability is network-exploitable without authentication.

3. Are there workarounds if patching isn’t immediate?

No, proper patching to Certifi 2023.07.22+ is essential.

4. Which platforms are most impacted?

IBM Cloud Pak, Red Hat systems, NetApp products, and any Python environment using affected Certifi.

5. Does this vulnerability affect both enterprise and individual applications?

Yes, any system relying on the affected Certifi versions for SSL/TLS validation is at risk.

Ready for a personalized security assessment?

“Choosing AccuKnox was driven by opensource KubeArmor’s novel use of eBPF and LSM technologies, delivering runtime security”

idt

Golan Ben-Oni

Chief Information Officer

“At Prudent, we advocate for a comprehensive end-to-end methodology in application and cloud security. AccuKnox excelled in all areas in our in depth evaluation.”

prudent

Manoj Kern

CIO

“Tible is committed to delivering comprehensive security, compliance, and governance for all of its stakeholders.”

tible

Merijn Boom

Managing Director