Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-xh5w-g8gq-r3v9 | Keylime allows users to register new agents by recycling existing UUIDs when using different TPM devices |
Solution
No solution given by the vendor.
Workaround
Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.
Tue, 25 Nov 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 24 Nov 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 24 Nov 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been identified in keylime where an attacker can exploit this flaw by registering a new agent using a different Trusted Platform Module (TPM) device but claiming an existing agent's unique identifier (UUID). This action overwrites the legitimate agent's identity, enabling the attacker to impersonate the compromised agent and potentially bypass security controls. | |
| Title | Keylime: keylime: registrar allows identity takeover via duplicate uuid registration | |
| First Time appeared |
Redhat
Redhat enterprise Linux |
|
| Weaknesses | CWE-694 | |
| CPEs | cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:9 |
|
| Vendors & Products |
Redhat
Redhat enterprise Linux |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-11-24T23:11:55.608Z
Reserved: 2025-11-24T15:47:12.935Z
Link: CVE-2025-13609
Updated: 2025-11-24T19:00:24.300Z
Status : Awaiting Analysis
Published: 2025-11-24T18:15:49.830
Modified: 2025-11-25T22:16:16.690
Link: CVE-2025-13609
OpenCVE Enrichment
No data.
Github GHSA