Impact
The Keylime registrar, used to authenticate and manage TPM‑based agents, has a flaw in all releases since 7.12.0. The registrar never demands a client certificate over its HTTPS interface, allowing any host that can reach port 8891 to connect without authentication. Once connected, the attacker can invoke administrative APIs that list agents, retrieve public TPM data, or delete agents. This bypass eliminates the required client‑side TLS authentication, effectively giving unauthenticated consumers privileged access to agent metadata and the ability to remove agents, compromising confidentiality, integrity, and availability of the managed infrastructure.
Affected Systems
Red Hat Enterprise Linux 9 and 10 systems running Keylime versions 7.12.0 or newer are affected. The issue is present in the Red Hat packages that ship with these operating systems, as indicated by the advisories added to RHSA‑2026:2224, RHSA‑2026:2225, and RHSA‑2026:2298.
Risk and Exploitability
The vulnerability carries a CVSS v3.1 score of 9.4, indicating high severity, but the EPSS score of less than 1 % suggests exploitation is considered improbable at present. The attack surface is the publicly reachable HTTPS port 8891; an attacker only needs network connectivity to the registrar and does not require local privileges. It is not listed in the CISA KEV catalog, implying no known community exploits yet. Nonetheless, the combination of high impact and ease of network reach warrants immediate attention.
OpenCVE Enrichment
Github GHSA