Описание
A flaw was found in Keylime. The Keylime registrar, since version 7.12.0, does not enforce client-side Transport Layer Security (TLS) authentication. This authentication bypass vulnerability allows unauthenticated clients with network access to perform administrative operations, including listing agents, retrieving public Trusted Platform Module (TPM) data, and deleting agents, by connecting without presenting a client certificate.
Отчет
This is a Critical authentication bypass flaw in the Keylime registrar, affecting versions 7.12.0 and later. The registrar fails to enforce client-side TLS authentication, enabling unauthenticated clients with network access to perform administrative actions such as listing or deleting agents and retrieving TPM data. Exploitation requires direct network access to the registrar's HTTPS port (default 8891). Keylime packages shipped in RHEL-9.6 and earlier are not affected, as they never shipped the version which introduced this vulnerability.
Меры по смягчению последствий
Restrict network access to the Keylime registrar's HTTPS port (default 8891) to only trusted verifier and tenant hosts using firewall rules. Alternatively, deploy a reverse proxy (e.g., Nginx, HAProxy) in front of the registrar to enforce client certificate authentication. Ensure any changes to firewall rules or proxy configurations are reloaded or services are restarted for the mitigation to take effect.
Дополнительная информация
Статус:
EPSS
9.4 Critical
CVSS3
Связанные уязвимости
A flaw was found in Keylime. The Keylime registrar, since version 7.12.0, does not enforce client-side Transport Layer Security (TLS) authentication. This authentication bypass vulnerability allows unauthenticated clients with network access to perform administrative operations, including listing agents, retrieving public Trusted Platform Module (TPM) data, and deleting agents, by connecting without presenting a client certificate.
A flaw was found in Keylime. The Keylime registrar, since version 7.12.0, does not enforce client-side Transport Layer Security (TLS) authentication. This authentication bypass vulnerability allows unauthenticated clients with network access to perform administrative operations, including listing agents, retrieving public Trusted Platform Module (TPM) data, and deleting agents, by connecting without presenting a client certificate.
Keylime Missing Authentication for Critical Function and Improper Authentication
EPSS
9.4 Critical
CVSS3