Lucene search

K
cvelistGitHub_MCVELIST:CVE-2020-15163
HistorySep 09, 2020 - 5:30 p.m.

CVE-2020-15163 Invalid root may become trusted root in The Update Framework (TUF)

2020-09-0917:30:19
CWE-863
GitHub_M
www.cve.org
4
the update framework
python tuf
invalid root
trust chain
metadata
attacker
security vulnerability

CVSS3

8.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N

AI Score

8.5

Confidence

High

EPSS

0.001

Percentile

44.5%

Python TUF (The Update Framework) reference implementation before version 0.12 it will incorrectly trust a previously downloaded root metadata file which failed verification at download time. This allows an attacker who is able to serve multiple new versions of root metadata (i.e. by a person-in-the-middle attack) culminating in a version which has not been correctly signed to control the trust chain for future updates. This is fixed in version 0.12 and newer.

CNA Affected

[
  {
    "product": "tuf",
    "vendor": "theupdateframework",
    "versions": [
      {
        "status": "affected",
        "version": "< 0.12"
      }
    ]
  }
]

CVSS3

8.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N

AI Score

8.5

Confidence

High

EPSS

0.001

Percentile

44.5%

Related for CVELIST:CVE-2020-15163