CVE-2025-1057
- EPSS 0.06%
- Veröffentlicht 15.03.2025 08:50:48
- Zuletzt bearbeitet 15.03.2025 09:15:10
A flaw was found in Keylime, a remote attestation solution, where strict type checking introduced in version 7.12.0 prevents the registrar from reading database entries created by previous versions, for example, 7.11.0. Specifically, older versions s...
CVE-2023-38201
- EPSS 0.02%
- Veröffentlicht 25.08.2023 17:15:08
- Zuletzt bearbeitet 21.11.2024 08:13:04
A flaw was found in the Keylime registrar that could allow a bypass of the challenge-response protocol during agent registration. This issue may allow an attacker to impersonate an agent and hide the true status of a monitored machine if the fake age...
CVE-2023-38200
- EPSS 0.21%
- Veröffentlicht 24.07.2023 16:15:12
- Zuletzt bearbeitet 21.11.2024 08:13:04
A flaw was found in Keylime. Due to their blocking nature, the Keylime registrar is subject to a remote denial of service against its SSL connections. This flaw allows an attacker to exhaust all available connections.
CVE-2023-3674
- EPSS 0.02%
- Veröffentlicht 19.07.2023 19:15:12
- Zuletzt bearbeitet 21.11.2024 08:17:48
A flaw was found in the keylime attestation verifier, which fails to flag a device's submitted TPM quote as faulty when the quote's signature does not validate for some reason. Instead, it will only emit an error in the log without flagging the devic...
CVE-2022-3500
- EPSS 0.03%
- Veröffentlicht 22.11.2022 19:15:17
- Zuletzt bearbeitet 29.04.2025 05:15:43
A vulnerability was found in keylime. This security issue happens in some circumstances, due to some improperly handled exceptions, there exists the possibility that a rogue agent could create errors on the verifier that stopped attestation attempts ...
CVE-2022-23949
- EPSS 0.4%
- Veröffentlicht 21.09.2022 19:15:10
- Zuletzt bearbeitet 27.05.2025 21:15:20
In Keylime before 6.3.0, unsanitized UUIDs can be passed by a rogue agent and can lead to log spoofing on the verifier and registrar.
CVE-2022-23950
- EPSS 0.39%
- Veröffentlicht 21.09.2022 19:15:10
- Zuletzt bearbeitet 27.05.2025 21:15:20
In Keylime before 6.3.0, Revocation Notifier uses a fixed /tmp path for UNIX domain socket which can allow unprivileged users a method to prohibit keylime operations.
CVE-2022-23951
- EPSS 0.06%
- Veröffentlicht 21.09.2022 19:15:10
- Zuletzt bearbeitet 27.05.2025 21:15:20
In Keylime before 6.3.0, quote responses from the agent can contain possibly untrusted ZIP data which can lead to zip bombs.
CVE-2022-23952
- EPSS 0.37%
- Veröffentlicht 21.09.2022 19:15:10
- Zuletzt bearbeitet 22.05.2025 19:15:29
In Keylime before 6.3.0, current keylime installer installs the keylime.conf file, which can contain sensitive data, as world-readable.
CVE-2021-43310
- EPSS 2.76%
- Veröffentlicht 21.09.2022 19:15:09
- Zuletzt bearbeitet 27.05.2025 21:15:20
A vulnerability in Keylime before 6.3.0 allows an attacker to craft a request to the agent that resets the U and V keys as if the agent were being re-added to a verifier. This could lead to a remote code execution.