A flaw was found in Keylime. The Keylime registrar, since version 7.12.0, does not enforce client-side Transport Layer Security (TLS) authentication. This authentication bypass vulnerability allows unauthenticated clients with network access to perform administrative operations, including listing agents, retrieving public Trusted Platform Module (TPM) data, and deleting agents, by connecting without presenting a client certificate.

Project Subscriptions

Vendors Products
Enterprise Linux Subscribe
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-4jqp-9qjv-57m2 Keylime Missing Authentication for Critical Function and Improper Authentication
Fixes

Solution

No solution given by the vendor.


Workaround

Restrict network access to the Keylime registrar's HTTPS port (default 8891) to only trusted verifier and tenant hosts using firewall rules. Alternatively, deploy a reverse proxy (e.g., Nginx, HAProxy) in front of the registrar to enforce client certificate authentication. Ensure any changes to firewall rules or proxy configurations are reloaded or services are restarted for the mitigation to take effect.

History

Fri, 06 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Feb 2026 19:30:00 +0000

Type Values Removed Values Added
Description A flaw was found in Keylime. The Keylime registrar, since version 7.12.0, does not enforce client-side Transport Layer Security (TLS) authentication. This authentication bypass vulnerability allows unauthenticated clients with network access to perform administrative operations, including listing agents, retrieving public Trusted Platform Module (TPM) data, and deleting agents, by connecting without presenting a client certificate.
Title Keylime: keylime: authentication bypass allows unauthorized administrative operations due to missing client-side tls authentication
First Time appeared Redhat
Redhat enterprise Linux
Weaknesses CWE-322
CPEs cpe:/o:redhat:enterprise_linux:10
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux
References
Metrics cvssV3_1

{'score': 9.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-02-06T19:38:39.749Z

Reserved: 2026-01-30T17:00:54.761Z

Link: CVE-2026-1709

cve-icon Vulnrichment

Updated: 2026-02-06T19:38:25.955Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-06T20:16:09.193

Modified: 2026-02-06T21:57:22.450

Link: CVE-2026-1709

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses