CVE-2020-15163

Python TUF (The Update Framework) reference implementation before version 0.12 it will incorrectly trust a previously downloaded root metadata file which failed verification at download time. This allows an attacker who is able to serve multiple new versions of root metadata (i.e. by a person-in-the-middle attack) culminating in a version which has not been correctly signed to control the trust chain for future updates. This is fixed in version 0.12 and newer.
Configurations

Configuration 1 (hide)

cpe:2.3:a:linuxfoundation:the_update_framework:*:*:*:*:*:*:*:*

History

18 Nov 2021, 17:45

Type Values Removed Values Added
References (CONFIRM) https://github.com/theupdateframework/tuf/commit/3d342e648fbacdf43a13d7ba8886aaaf07334af7 - Patch, Third Party Advisory (CONFIRM) https://github.com/theupdateframework/tuf/commit/3d342e648fbacdf43a13d7ba8886aaaf07334af7 - Broken Link
CWE CWE-863 CWE-345

Information

Published : 2020-09-09 18:15

Updated : 2023-12-10 13:27


NVD link : CVE-2020-15163

Mitre link : CVE-2020-15163

CVE.ORG link : CVE-2020-15163


JSON object : View

Products Affected

linuxfoundation

  • the_update_framework
CWE
CWE-345

Insufficient Verification of Data Authenticity

CWE-863

Incorrect Authorization