CVE-2025-13609
- EPSS 0.07%
- Veröffentlicht 24.11.2025 18:15:49
- Zuletzt bearbeitet 12.01.2026 03:16:06
A vulnerability has been identified in keylime where an attacker can exploit this flaw by registering a new agent using a different Trusted Platform Module (TPM) device but claiming an existing agent's unique identifier (UUID). This action overwrites...
CVE-2025-1057
- EPSS 0.12%
- Veröffentlicht 15.03.2025 08:50:48
- Zuletzt bearbeitet 15.03.2025 09:15:10
A flaw was found in Keylime, a remote attestation solution, where strict type checking introduced in version 7.12.0 prevents the registrar from reading database entries created by previous versions, for example, 7.11.0. Specifically, older versions s...
CVE-2023-38201
- EPSS 0.02%
- Veröffentlicht 25.08.2023 17:15:08
- Zuletzt bearbeitet 21.11.2024 08:13:04
A flaw was found in the Keylime registrar that could allow a bypass of the challenge-response protocol during agent registration. This issue may allow an attacker to impersonate an agent and hide the true status of a monitored machine if the fake age...
CVE-2023-38200
- EPSS 0.81%
- Veröffentlicht 24.07.2023 16:15:12
- Zuletzt bearbeitet 21.11.2024 08:13:04
A flaw was found in Keylime. Due to their blocking nature, the Keylime registrar is subject to a remote denial of service against its SSL connections. This flaw allows an attacker to exhaust all available connections.
CVE-2023-3674
- EPSS 0.02%
- Veröffentlicht 19.07.2023 19:15:12
- Zuletzt bearbeitet 21.11.2024 08:17:48
A flaw was found in the keylime attestation verifier, which fails to flag a device's submitted TPM quote as faulty when the quote's signature does not validate for some reason. Instead, it will only emit an error in the log without flagging the devic...
CVE-2022-3500
- EPSS 0.15%
- Veröffentlicht 22.11.2022 19:15:17
- Zuletzt bearbeitet 29.04.2025 05:15:43
A vulnerability was found in keylime. This security issue happens in some circumstances, due to some improperly handled exceptions, there exists the possibility that a rogue agent could create errors on the verifier that stopped attestation attempts ...
CVE-2022-23949
- EPSS 0.4%
- Veröffentlicht 21.09.2022 19:15:10
- Zuletzt bearbeitet 27.05.2025 21:15:20
In Keylime before 6.3.0, unsanitized UUIDs can be passed by a rogue agent and can lead to log spoofing on the verifier and registrar.
CVE-2022-23950
- EPSS 0.39%
- Veröffentlicht 21.09.2022 19:15:10
- Zuletzt bearbeitet 27.05.2025 21:15:20
In Keylime before 6.3.0, Revocation Notifier uses a fixed /tmp path for UNIX domain socket which can allow unprivileged users a method to prohibit keylime operations.
CVE-2022-23951
- EPSS 0.06%
- Veröffentlicht 21.09.2022 19:15:10
- Zuletzt bearbeitet 27.05.2025 21:15:20
In Keylime before 6.3.0, quote responses from the agent can contain possibly untrusted ZIP data which can lead to zip bombs.
CVE-2022-23952
- EPSS 0.37%
- Veröffentlicht 21.09.2022 19:15:10
- Zuletzt bearbeitet 22.05.2025 19:15:29
In Keylime before 6.3.0, current keylime installer installs the keylime.conf file, which can contain sensitive data, as world-readable.