TrustAsia Pulls 143 Certificates Following Critical LiteSSL ACME Vulnerability

TrustAsia Pulls 143 Certificates Following Critical LiteSSL ACME Vulnerability

TrustAsia has revoked 143 SSL/TLS certificates following the discovery of a critical vulnerability in its LiteSSL ACME service.

The flaw, disclosed on January 21, 2026, permitted the reuse of domain validation data across different ACME accounts, allowing unauthorized certificate issuance for domains that were validated by other users.

The vulnerability violated the CA/Browser Forum Baseline Requirements (TLS BR Version 2.2.2, Section 3.2.2.4), which mandates unique domain validation for each certificate issuance.

The core issue stemmed from a logic error in LiteSSL’s ACME service handling of Authorization objects.

The service failed to verify whether a Certificate Signing Request (CSR) originated from the same ACME account that performed the initial validation, as reported by Mozilla.

This lapse allowed attackers to hijack the issuance process and obtain wildcard certificates for arbitrary domains without re-triggering DNS-01 challenges.

Additionally, researchers discovered that LiteSSL maintained an excessively prolonged cache for DNS-01 validation challenges, extending the exploitation window significantly.

Field Value
Certificate Authority TrustAsia
Affected Service LiteSSL ACME
Vulnerability Type Domain Validation Reuse / Authorization Bypass
Certificates Impacted 143 total (140 revoked, 3 previously revoked)
Issuance Period After December 29, 2025
Protocol ACME (DNS-01 challenge)

All 143 affected certificates were issued via the ACME protocol after December 29, 2025. Upon confirming the vulnerability, TrustAsia immediately suspended ACME issuance services and initiated a comprehensive system remediation.

Within hours, the company completed code fixes, deployed patches to production, and revoked 140 still-valid certificates; three had been previously revoked.

TrustAsia reset all ACME Authorizations in production from VALID to REVOKED status, forcing clients to perform re-validation before resuming certificate issuance.

The incident constitutes non-compliance with CA/Browser Forum requirements. TrustAsia has committed to publishing a comprehensive Full Incident Report detailing root cause analysis and the precise non-compliance start date.

Incident Timeline and Technical Data

Time (UTC+8) Event Details
14:55 Report Received Community report via V2EX flagged domain validation reuse issue
15:10 Preliminary Confirmation Issue confirmed; ACME issuance service suspended immediately
15:30 Scope Investigation Impact scope identified; certificate investigation began
15:33 Initial Revocation Two certificates from community report revoked
21:00 Code Fix Completed Fix validated successfully in test environment
21:21 Full Scope Identified All 143 affected certificates identified; batch revocation initiated
21:30 Revocation Completed 140 valid certificates revoked (3 previously revoked)
21:41 Production Deployment Patched code deployed to production environment
22:35 Authorization Reset All ACME Authorizations reset from VALID to REVOKED; re-validation requested
22:50 Internal Validation Production environment validation completed successfully
23:00 Service Restored External ACME issuance service fully restored

TrustAsia demonstrated rapid incident response by containing the vulnerability within 8 hours of discovery and fully remediating the service.

Organizations that issued certificates via LiteSSL ACME between December 29, 2025, and January 21, 2026, should verify certificate status and prepare for potential re-issuance requirements.

The incident underscores the critical importance of proper account context validation in ACME implementations and the necessity of strict separation between user domains during certificate validation workflows.

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link