Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:43195
HistorySep 08, 2023 - 8:20 a.m.

Authorization Bypass

2023-09-0808:20:37
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
2
keylime
vulnerability
challenge-response protocol
agent registration
http error message
activation

6.5 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

0.0005 Low

EPSS

Percentile

19.1%

Keylime is vulnerable to an attack which allows an attacker to Bypass the Challenge-Response Protocol during agent registration. The vulnerability occurs due to the registrar disclosing the correct “auth_tag” in the error message. This could allow an attacker to simply record the correct expected “auth_tag” from the HTTP error message and perform the activate call again bypassing registration process.

CPENameOperatorVersion
keylimele7.4.0
keylimele7.4.0

6.5 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

0.0005 Low

EPSS

Percentile

19.1%