Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-30836: Step CA SCEP UpdateReq Allows Unauthenticated Certificate Issuance (CVSS 10)
CVE-2026-30836: Step CA SCEP UpdateReq Allows Unauthenticated Certificate Issuance (CVSS 10)

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-30836

CVE-2026-30836: Step CA SCEP UpdateReq Allows Unauthenticated Certificate Issuance (CVSS 10)

A maximum-severity vulnerability in Smallstep's Step CA certificate authority allows unauthenticated attackers to issue arbitrary certificates via the...

Dylan H.

Security Team

March 20, 2026
7 min read

Affected Products

  • smallstep/certificates <= 0.30.0-rc6

Executive Summary

A maximum-severity vulnerability (CVE-2026-30836) has been disclosed in Step CA (also known as step-ca or smallstep/certificates), a widely deployed open-source certificate authority used in DevOps, Kubernetes, and zero-trust networking environments. The flaw carries a CVSS score of 10.0 — the highest possible rating.

The vulnerability exists in the SCEP (Simple Certificate Enrollment Protocol) implementation: specifically the UpdateReq endpoint fails to enforce authentication before issuing certificates. An unauthenticated attacker who can reach the SCEP endpoint can obtain valid TLS/mTLS certificates signed by the trusted CA — completely bypassing all intended enrollment controls.

All Step CA versions 0.30.0-rc6 and earlier are affected. The issue has been resolved in version 0.30.0. Organizations running Step CA in any capacity should treat this as an emergency patch.


Vulnerability Overview

AttributeValue
CVE IDCVE-2026-30836
CVSS Score10.0 (Critical)
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
CWECWE-306 — Missing Authentication for Critical Function
TypeUnauthenticated Certificate Issuance
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Patch AvailableYes — Step CA 0.30.0
NVD Published2026-03-19

Affected Versions

ProductAffected VersionsFixed Version
smallstep/certificates (Step CA)≤ 0.30.0-rc60.30.0

Technical Analysis

What Is Step CA?

Step CA is a production-grade online certificate authority developed by Smallstep. It is commonly deployed to:

  • Automate TLS certificate issuance and renewal for microservices
  • Power mTLS authentication in Kubernetes and service mesh environments
  • Implement zero-trust networking (device and workload identity)
  • Serve as the backend for ACME, SCEP, JWK, and OIDC certificate provisioners

Because Step CA acts as a trusted root or intermediate CA, certificates it issues are inherently trusted across the entire deployment — making this vulnerability especially dangerous.

The SCEP Protocol and UpdateReq

SCEP (RFC 8894) is a protocol originally designed for enrolling network devices (routers, switches, IoT) in a PKI. It supports several operations including PKCSReq (initial enrollment) and UpdateReq (certificate renewal/update without a new enrollment challenge).

The UpdateReq operation is designed to allow an already-enrolled device to renew its certificate by authenticating with its existing valid certificate (rather than a challenge password). Step CA's implementation of UpdateReq failed to verify that the signing certificate presented in the renewal request was:

  1. Previously issued by this CA
  2. Not expired or revoked
  3. Authorized to renew

Without these checks, any client can construct a valid-looking UpdateReq SCEP message and obtain a freshly signed certificate from the CA.

Attack Flow

1. Attacker identifies a Step CA instance with SCEP provisioner enabled
2. Attacker crafts a SCEP UpdateReq message using any self-signed or arbitrary certificate
3. Request is submitted to the SCEP endpoint (unauthenticated network access only required)
4. Step CA's UpdateReq handler issues a new certificate signed by the CA's private key
5. Attacker receives a valid CA-signed certificate for any Subject/SAN they specified
6. Certificate can be used to:
   - Impersonate any service in mTLS environments
   - Perform MITM attacks on TLS-protected internal services
   - Gain unauthorized access to services that use certificate-based auth
   - Enumerate and pivot within zero-trust architectures

Why CVSS 10.0

The maximum score reflects the scope and severity of impact:

MetricValueReason
No authenticationPR:NExploitable by any network-connected attacker
No user interactionUI:NFully automated exploitation
Low complexityAC:LSCEP is a well-documented protocol; tooling exists
Changed scopeS:CCA compromise affects all relying parties system-wide
Full C/I/AH/H/HArbitrary certificate issuance undermines entire PKI trust model

Impact Assessment

Impact AreaDescription
Identity ForgeryAttacker can obtain certificates impersonating any service or user in the PKI
mTLS BypassService-to-service authentication using mutual TLS is completely undermined
MITM AttacksValid CA-signed certs enable transparent interception of encrypted traffic
Lateral MovementCertificate-authenticated services become accessible to the attacker
Zero-Trust CollapseEnvironments relying on Step CA for device/workload identity lose all trust guarantees
Long-Term PersistenceCertificates can be issued with extended validity for persistent access
Kubernetes ImpactClusters using Step CA for kubelet/kube-apiserver TLS are severely exposed

Who Uses Step CA

Step CA is widely deployed across:

  • Kubernetes clusters (cert-manager integration, kubelet certificates)
  • HashiCorp Vault environments (as a PKI backend alternative)
  • Home labs and enterprise zero-trust deployments
  • IoT device management (via SCEP provisioner specifically)
  • Internal developer platforms requiring automated certificate lifecycle management

Any deployment with a SCEP provisioner configured is directly exploitable.


Immediate Remediation

Step 1: Upgrade to Step CA 0.30.0

# Check current version
step-ca version
 
# Using Homebrew (macOS/Linux)
brew upgrade step
 
# Using the Smallstep install script
curl -sSf https://dl.smallstep.com/install.sh | sh
 
# Verify the upgrade
step-ca version
# Expected: Smallstep CA/0.30.0 ...

For container/Kubernetes deployments:

# Update the step-ca container image tag
# docker.io/smallstep/step-ca:0.30.0
 
# Kubernetes — update the image in your deployment
kubectl set image deployment/step-ca \
  step-ca=smallstep/step-ca:0.30.0 \
  -n <namespace>
 
# Verify rollout
kubectl rollout status deployment/step-ca -n <namespace>

Step 2: Temporary Mitigation — Disable SCEP If Not Required

If SCEP is not needed, disable the SCEP provisioner entirely until the upgrade is complete:

# List current provisioners
step ca provisioner list
 
# Remove the SCEP provisioner (replace <name> with your SCEP provisioner name)
step ca provisioner remove <name> --type scep
 
# Restart step-ca to apply changes
systemctl restart step-ca  # or however your instance is managed

Step 3: Audit for Unauthorized Certificate Issuance

After patching, audit your CA's certificate log for unexpected issuances:

# If using step-ca with a database backend, query issued certificates
# Check your CA's audit log for SCEP UpdateReq operations pre-patch
 
# List all issued (and still-valid) certificates
step ca certificate-list --not-after="+0s"
 
# Review certificates issued during the vulnerability window
# Look for unexpected subjects, SANs, or requestor identifiers

Step 4: Revoke Any Suspicious Certificates

# Revoke a specific certificate by serial number
step ca revoke <serial-number>
 
# Or by certificate file
step ca revoke --cert suspicious-cert.pem

Detection Indicators

IndicatorDescription
SCEP UpdateReq requests from unexpected source IPsUnauthorized enrollment attempts
Certificates with unexpected Subject/SAN values in the CA logEvidence of unauthorized issuance
mTLS authentication successes from unrecognized workloadsCertificate-based lateral movement
Spike in SCEP endpoint trafficAutomated exploitation or scanning
New certificates with unusually long validity periodsAttacker-issued persistence certificates

Post-Remediation Checklist

  1. Upgrade Step CA to version 0.30.0 or later on all instances
  2. Revoke any certificates that may have been fraudulently issued during the vulnerability window
  3. Audit the CA certificate log for anomalous issuances (unexpected subjects, SANs, issuance times)
  4. Rotate the CA's signing key if unauthorized issuance is confirmed or strongly suspected
  5. Review all SCEP provisioner configurations — disable SCEP if not required
  6. Segment CA endpoints behind network access controls (firewall, VPN, internal-only routing)
  7. Enable certificate transparency or audit logging if not already configured
  8. Alert on SCEP UpdateReq events from non-enrolled or unexpected sources going forward
  9. Notify downstream relying parties if CA rotation is performed

References

  • NVD — CVE-2026-30836
  • Smallstep Certificates GitHub Repository
  • Step CA Documentation — SCEP Provisioner
  • RFC 8894 — Simple Certificate Enrollment Protocol
#CVE-2026-30836#Step CA#Smallstep#SCEP#PKI#Certificate Authority#Unauthenticated#DevOps#Zero Trust

Related Articles

CVE-2025-54068: Laravel Livewire Code Injection Vulnerability

A critical code injection vulnerability in Laravel Livewire v3 allows unauthenticated remote attackers to execute arbitrary commands. Over 130,000...

7 min read

CVE-2025-32432: Craft CMS Code Injection Vulnerability

A critical code injection vulnerability in Craft CMS allows unauthenticated remote attackers to execute arbitrary code on affected servers. Added to...

6 min read

CVE-2026-21992: Critical Oracle Identity Manager Unauthenticated RCE via REST WebServices

Oracle's March 2026 Critical Patch Update includes CVE-2026-21992, a CVSS 9.8 unauthenticated remote code execution vulnerability in Oracle Identity...

7 min read
Back to all Security Alerts