CVE-2022-23949
Published on: Not Yet Published
Last Modified on: 12/21/2022 03:01:00 PM UTC
Certain versions of Keylime from Keylime contain the following vulnerability:
In Keylime before 6.3.0, unsanitized UUIDs can be passed by a rogue agent and can lead to log spoofing on the verifier and registrar.
- CVE-2022-23949 has been assigned by
patrick@puiterwijk.org to track the vulnerability - currently rated as HIGH severity.
CVSS3 Score: 7.5 - HIGH
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | NONE | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | NONE | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
validators: create validators module · keylime/keylime@65c2b73 · GitHub | github.com text/html |
![]() |
validators: add uuid and agent_id validators · keylime/keylime@e429e95 · GitHub | github.com text/html |
![]() |
Validate user ID in all public interfaces · keylime/keylime@387e320 · GitHub | github.com text/html |
![]() |
oss-sec: keylime: Multiple Security Issues (including remote code execution in the Agent component) | seclists.org text/html |
![]() |
Keylime: Unsanitized UUIDs can lead to log spoofing · Advisory · keylime/keylime · GitHub | github.com text/html |
![]() |
Related QID Numbers
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Keylime | Keylime | All | All | All | All |
- cpe:2.3:a:keylime:keylime:*:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2022-23949 : In Keylime before 6.3.0, unsanitized UUIDs can be passed by a rogue agent and can lead to log spoo… twitter.com/i/web/status/1… | 2022-09-21 19:06:34 |
![]() |
CVE-2022-23949 | 2022-09-21 20:38:45 |