VYPR
Low severityNVD Advisory· Published Jul 5, 2024· Updated Feb 14, 2025

Certifi removes GLOBALTRUST root certificate

CVE-2024-39689

Description

Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi starting in 2021.5.30 and prior to 2024.7.4 recognized root certificates from GLOBALTRUST. Certifi 2024.7.04 removes root certificates from GLOBALTRUST from the root store. These are in the process of being removed from Mozilla's trust store. GLOBALTRUST's root certificates are being removed pursuant to an investigation which identified "long-running and unresolved compliance issues."

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Certifi removes GLOBALTRUST root certificates due to long-running compliance issues, affecting TLS trust validation.

Vulnerability

Overview Certifi, a curated collection of root certificates for SSL/TLS trust validation, has removed root certificates from GLOBALTRUST (e-commerce monitoring GmbH) starting in version 2024.07.04 [2]. The certificates were previously included in versions from 2021.5.30 through 2024.06.02 [2]. This removal follows an investigation by Mozilla that identified "long-running and unresolved compliance issues" with the CA, including failure to adhere to compliance obligations, repeated delays in incident reporting, and inadequate root cause analyses [1].

Exploitation

Context The vulnerability is not directly exploitable in the traditional sense; rather, it concerns the trustworthiness of certificates issued by GLOBALTRUST. Systems using older versions of Certifi (prior to 2024.07.04) continue to trust certificates chaining to these root CAs, even though the CA has been found non-compliant with industry standards [1][2]. An attacker who compromises the GLOBALTRUST CA or obtains mis-issued certificates could potentially impersonate legitimate TLS endpoints, as the root certificates remain trusted in outdated Certifi installations.

Impact

If an attacker exploits the continued trust in GLOBALTRUST roots, they could perform man-in-the-middle attacks or serve fraudulent content that appears valid to clients using affected Certifi versions. The impact is mitigated by the fact that the CA's compliance issues have been publicly documented and the roots are being distrusted by Mozilla [1]. However, until users update Certifi, their TLS connections may still accept certificates from this CA, undermining the security guarantees of the trust store.

Mitigation

The fix is to upgrade Certifi to version 2024.07.04 or later, which removes the GLOBALTRUST root certificates [3]. The Python advisory database also recommends this update [4]. No workaround is available; users must update the package. The removal aligns with Mozilla's ongoing distrust of the CA [1].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
certifiPyPI
>= 2021.5.30, < 2024.7.42024.7.4

Affected products

193

Patches

1
bd8153872e9c

2024.07.04 (#295)

https://github.com/certifi/python-certifigithub-actions[bot]Jul 4, 2024via ghsa
2 files changed · +1 41
  • certifi/cacert.pem+0 40 modified
    @@ -3485,46 +3485,6 @@ DgQWBBQxCpCPtsad0kRLgLWi5h+xEk8blTAKBggqhkjOPQQDAwNoADBlAjEA31SQ
     +RHUjE7AwWHCFUyqqx0LMV87HOIAl0Qx5v5zli/altP+CAezNIm8BZ/3Hobui3A=
     -----END CERTIFICATE-----
     
    -# Issuer: CN=GLOBALTRUST 2020 O=e-commerce monitoring GmbH
    -# Subject: CN=GLOBALTRUST 2020 O=e-commerce monitoring GmbH
    -# Label: "GLOBALTRUST 2020"
    -# Serial: 109160994242082918454945253
    -# MD5 Fingerprint: 8a:c7:6f:cb:6d:e3:cc:a2:f1:7c:83:fa:0e:78:d7:e8
    -# SHA1 Fingerprint: d0:67:c1:13:51:01:0c:aa:d0:c7:6a:65:37:31:16:26:4f:53:71:a2
    -# SHA256 Fingerprint: 9a:29:6a:51:82:d1:d4:51:a2:e3:7f:43:9b:74:da:af:a2:67:52:33:29:f9:0f:9a:0d:20:07:c3:34:e2:3c:9a
    ------BEGIN CERTIFICATE-----
    -MIIFgjCCA2qgAwIBAgILWku9WvtPilv6ZeUwDQYJKoZIhvcNAQELBQAwTTELMAkG
    -A1UEBhMCQVQxIzAhBgNVBAoTGmUtY29tbWVyY2UgbW9uaXRvcmluZyBHbWJIMRkw
    -FwYDVQQDExBHTE9CQUxUUlVTVCAyMDIwMB4XDTIwMDIxMDAwMDAwMFoXDTQwMDYx
    -MDAwMDAwMFowTTELMAkGA1UEBhMCQVQxIzAhBgNVBAoTGmUtY29tbWVyY2UgbW9u
    -aXRvcmluZyBHbWJIMRkwFwYDVQQDExBHTE9CQUxUUlVTVCAyMDIwMIICIjANBgkq
    -hkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAri5WrRsc7/aVj6B3GyvTY4+ETUWiD59b
    -RatZe1E0+eyLinjF3WuvvcTfk0Uev5E4C64OFudBc/jbu9G4UeDLgztzOG53ig9Z
    -YybNpyrOVPu44sB8R85gfD+yc/LAGbaKkoc1DZAoouQVBGM+uq/ufF7MpotQsjj3
    -QWPKzv9pj2gOlTblzLmMCcpL3TGQlsjMH/1WljTbjhzqLL6FLmPdqqmV0/0plRPw
    -yJiT2S0WR5ARg6I6IqIoV6Lr/sCMKKCmfecqQjuCgGOlYx8ZzHyyZqjC0203b+J+
    -BlHZRYQfEs4kUmSFC0iAToexIiIwquuuvuAC4EDosEKAA1GqtH6qRNdDYfOiaxaJ
    -SaSjpCuKAsR49GiKweR6NrFvG5Ybd0mN1MkGco/PU+PcF4UgStyYJ9ORJitHHmkH
    -r96i5OTUawuzXnzUJIBHKWk7buis/UDr2O1xcSvy6Fgd60GXIsUf1DnQJ4+H4xj0
    -4KlGDfV0OoIu0G4skaMxXDtG6nsEEFZegB31pWXogvziB4xiRfUg3kZwhqG8k9Me
    -dKZssCz3AwyIDMvUclOGvGBG85hqwvG/Q/lwIHfKN0F5VVJjjVsSn8VoxIidrPIw
    -q7ejMZdnrY8XD2zHc+0klGvIg5rQmjdJBKuxFshsSUktq6HQjJLyQUp5ISXbY9e2
    -nKd+Qmn7OmMCAwEAAaNjMGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC
    -AQYwHQYDVR0OBBYEFNwuH9FhN3nkq9XVsxJxaD1qaJwiMB8GA1UdIwQYMBaAFNwu
    -H9FhN3nkq9XVsxJxaD1qaJwiMA0GCSqGSIb3DQEBCwUAA4ICAQCR8EICaEDuw2jA
    -VC/f7GLDw56KoDEoqoOOpFaWEhCGVrqXctJUMHytGdUdaG/7FELYjQ7ztdGl4wJC
    -XtzoRlgHNQIw4Lx0SsFDKv/bGtCwr2zD/cuz9X9tAy5ZVp0tLTWMstZDFyySCstd
    -6IwPS3BD0IL/qMy/pJTAvoe9iuOTe8aPmxadJ2W8esVCgmxcB9CpwYhgROmYhRZf
    -+I/KARDOJcP5YBugxZfD0yyIMaK9MOzQ0MAS8cE54+X1+NZK3TTN+2/BT+MAi1bi
    -kvcoskJ3ciNnxz8RFbLEAwW+uxF7Cr+obuf/WEPPm2eggAe2HcqtbepBEX4tdJP7
    -wry+UUTF72glJ4DjyKDUEuzZpTcdN3y0kcra1LGWge9oXHYQSa9+pTeAsRxSvTOB
    -TI/53WXZFM2KJVj04sWDpQmQ1GwUY7VA3+vA/MRYfg0UFodUJ25W5HCEuGwyEn6C
    -MUO+1918oa2u1qsgEu8KwxCMSZY13At1XrFP1U80DhEgB3VDRemjEdqso5nCtnkn
    -4rnvyOL2NSl6dPrFf4IFYqYK6miyeUcGbvJXqBUzxvd4Sj1Ce2t+/vdG6tHrju+I
    -aFvowdlxfv1k7/9nR4hYJS8+hge9+6jlgqispdNpQ80xiEmEU5LAsTkbOYMBMMTy
    -qfrQA71yN2BWHzZ8vTmR9W0Nv3vXkg==
    ------END CERTIFICATE-----
    -
     # Issuer: CN=ANF Secure Server Root CA O=ANF Autoridad de Certificacion OU=ANF CA Raiz
     # Subject: CN=ANF Secure Server Root CA O=ANF Autoridad de Certificacion OU=ANF CA Raiz
     # Label: "ANF Secure Server Root CA"
    
  • certifi/__init__.py+1 1 modified
    @@ -1,4 +1,4 @@
     from .core import contents, where
     
     __all__ = ["contents", "where"]
    -__version__ = "2024.06.02"
    +__version__ = "2024.07.04"
    

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

7

News mentions

0

No linked articles in our index yet.