A vulnerability in Keylime before 6.3.0 allows an attacker to craft a request to the agent that resets the U and V keys as if the agent were being re-added to a verifier. This could lead to a remote code execution.
References
Link | Resource |
---|---|
https://github.com/keylime/keylime/security/advisories/GHSA-2m39-75g9-ff5r | Mitigation Third Party Advisory |
https://seclists.org/oss-sec/2022/q1/101 | Exploit Mailing List Patch Third Party Advisory |
Configurations
History
22 Sep 2022, 16:19
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CPE | cpe:2.3:a:keylime:keylime:*:*:*:*:*:*:*:* | |
CWE | CWE-290 | |
References | (MISC) https://github.com/keylime/keylime/security/advisories/GHSA-2m39-75g9-ff5r - Mitigation, Third Party Advisory | |
References | (MISC) https://seclists.org/oss-sec/2022/q1/101 - Exploit, Mailing List, Patch, Third Party Advisory | |
First Time |
Keylime
Keylime keylime |
21 Sep 2022, 19:39
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-09-21 19:15
Updated : 2023-12-10 14:35
NVD link : CVE-2021-43310
Mitre link : CVE-2021-43310
CVE.ORG link : CVE-2021-43310
JSON object : View
Products Affected
keylime
- keylime
CWE
CWE-290
Authentication Bypass by Spoofing