VYPR
High severityGHSA Advisory· Published May 8, 2026

epa4all-client has a VAU Signature bypass

CVE-2026-44900

Description

Impact

In SignedPublicKeysTrustValidatorImpl.isTrusted(), the ECDSA signature verification at line 45 discards the boolean return value of Signature.verify(). The method performs certificate chain validation, OCSP check, and signature algorithm setup, but never checks whether the signature actually matches. For any structurally valid signature, it returns true.

Patches

Patched in #34.

Workarounds

None.

### Resources - MS-OVIVA-EPA4ALL-d76aec

Credits

Machine Spirits (contact@machinespirits.de) - Dr. rer. nat. Simon Weber - Dipl.-Inf. Volker Schönefeld - Chiara Fliegner

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
com.oviva.telematik:epa4all-clientMaven
< 1.2.11.2.1

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.