Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-phcg-h58r-gmcq

Опубликовано: 04 фев. 2026
Источник: github
Github: Прошло ревью
CVSS3: 5.2

Описание

EVE Doesn't Measure Config Partition From 2 Fronts

Impact

PCR14 is not included in the list of PCRs that seal/unseal the vault key. Additionally, the vault key uses SHA1 PCRs instead of SHA256. Thus an attacker with physical access can take out the disk, use a different computer to modify the files in the /config partition, and re-insert the disk and boot without the change being detected by measured boot and remote attestation.

Patches

Fixed in EVE version 9.4.3-lts

Workarounds

None (apart from preventing physical access to the device)

Resources

https://help.zededa.com/hc/en-us/articles/43295940828827-TPM-PCR-Index-Security-Implications https://github.com/lf-edge/eve/commit/d9383a7ee4e1c39f5c8c6d4a63cb2ebd00695e8a

Пакеты

Наименование

github.com/lf-edge/eve

go
Затронутые версииВерсия исправления

< 0.0.0-20230126065759-d9383a7ee4e1

0.0.0-20230126065759-d9383a7ee4e1

EPSS

Процентиль: 2%
0.00013
Низкий

5.2 Medium

CVSS3

Дефекты

CWE-328
CWE-522

Связанные уязвимости

CVSS3: 8.8
nvd
больше 2 лет назад

PCR14 is not in the list of PCRs that seal/unseal the “vault” key, but due to the change that was implemented in commit “7638364bc0acf8b5c481b5ce5fea11ad44ad7fd4”, fixing this issue alone would not solve the problem of the config partition not being measured correctly. Also, the “vault” key is sealed/unsealed with SHA1 PCRs instead of SHA256. This issue was somewhat mitigated due to all of the PCR extend functions updating both the values of SHA256 and SHA1 for a given PCR ID. However, due to the change that was implemented in commit “7638364bc0acf8b5c481b5ce5fea11ad44ad7fd4”, this is no longer the case for PCR14, as the code in “measurefs.go” explicitly updates only the SHA256 instance of PCR14, which means that even if PCR14 were to be added to the list of PCRs sealing/unsealing the “vault” key, changes to the config partition would still not be measured. An attacker could modify the config partition without triggering the measured boot, this could resul

EPSS

Процентиль: 2%
0.00013
Низкий

5.2 Medium

CVSS3

Дефекты

CWE-328
CWE-522