Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-38201

Опубликовано: 23 авг. 2023
Источник: redhat
CVSS3: 6.5

Описание

A flaw was found in the Keylime registrar that could allow a bypass of the challenge-response protocol during agent registration. This issue may allow an attacker to impersonate an agent and hide the true status of a monitored machine if the fake agent is added to the verifier list by a legitimate user, resulting in a breach of the integrity of the registrar database.

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-639
https://bugzilla.redhat.com/show_bug.cgi?id=2222693Keylime: challenge-response protocol bypass during agent registration

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 2 лет назад

A flaw was found in the Keylime registrar that could allow a bypass of the challenge-response protocol during agent registration. This issue may allow an attacker to impersonate an agent and hide the true status of a monitored machine if the fake agent is added to the verifier list by a legitimate user, resulting in a breach of the integrity of the registrar database.

CVSS3: 6.5
nvd
около 2 лет назад

A flaw was found in the Keylime registrar that could allow a bypass of the challenge-response protocol during agent registration. This issue may allow an attacker to impersonate an agent and hide the true status of a monitored machine if the fake agent is added to the verifier list by a legitimate user, resulting in a breach of the integrity of the registrar database.

suse-cvrf
около 2 лет назад

Security update for keylime

CVSS3: 6.5
github
около 2 лет назад

Keylime registrar and (untrusted) Agent can be bypassed by an attacker

oracle-oval
почти 2 года назад

ELSA-2023-5080: keylime security update (MODERATE)

6.5 Medium

CVSS3