CVE-2021-43310

A vulnerability in Keylime before 6.3.0 allows an attacker to craft a request to the agent that resets the U and V keys as if the agent were being re-added to a verifier. This could lead to a remote code execution.
References
Link Resource
https://github.com/keylime/keylime/security/advisories/GHSA-2m39-75g9-ff5r Mitigation Third Party Advisory
https://seclists.org/oss-sec/2022/q1/101 Exploit Mailing List Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:keylime:keylime:*:*:*:*:*:*:*:*

History

22 Sep 2022, 16:19

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CPE cpe:2.3:a:keylime:keylime:*:*:*:*:*:*:*:*
CWE CWE-290
References (MISC) https://github.com/keylime/keylime/security/advisories/GHSA-2m39-75g9-ff5r - (MISC) https://github.com/keylime/keylime/security/advisories/GHSA-2m39-75g9-ff5r - Mitigation, Third Party Advisory
References (MISC) https://seclists.org/oss-sec/2022/q1/101 - (MISC) https://seclists.org/oss-sec/2022/q1/101 - Exploit, Mailing List, Patch, Third Party Advisory
First Time Keylime
Keylime keylime

21 Sep 2022, 19:39

Type Values Removed Values Added
New CVE

Information

Published : 2022-09-21 19:15

Updated : 2022-09-22 16:19


NVD link : CVE-2021-43310

Mitre link : CVE-2021-43310


JSON object : View

Products Affected

keylime

  • keylime
CWE
CWE-290

Authentication Bypass by Spoofing