Project Subscriptions
| Vendors | Products |
|---|---|
|
Keylime
Subscribe
|
Keylime
Subscribe
|
|
Redhat
Subscribe
|
Enterprise Linux
Subscribe
Enterprise Linux Eus
Subscribe
Enterprise Linux For Arm 64
Subscribe
Enterprise Linux For Arm 64 Eus
Subscribe
Enterprise Linux For Ibm Z Systems
Subscribe
Enterprise Linux For Ibm Z Systems Eus
Subscribe
Enterprise Linux For Power Little Endian
Subscribe
Enterprise Linux For Power Little Endian Eus
Subscribe
|
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-4jqp-9qjv-57m2 | Keylime Missing Authentication for Critical Function and Improper Authentication |
Solution
No solution given by the vendor.
Workaround
Restrict network access to the Keylime registrar's HTTPS port (default 8891) to only trusted verifier and tenant hosts using firewall rules. Alternatively, deploy a reverse proxy (e.g., Nginx, HAProxy) in front of the registrar to enforce client certificate authentication. Ensure any changes to firewall rules or proxy configurations are reloaded or services are restarted for the mitigation to take effect.
Thu, 05 Mar 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Keylime
Keylime keylime Redhat enterprise Linux For Arm 64 Redhat enterprise Linux For Arm 64 Eus Redhat enterprise Linux For Ibm Z Systems Redhat enterprise Linux For Ibm Z Systems Eus Redhat enterprise Linux For Power Little Endian Redhat enterprise Linux For Power Little Endian Eus |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:keylime:keylime:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:10.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_arm_64:10.0_aarch64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0_aarch64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:10.0_aarch64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:10.0_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:10.0_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:10.0_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:10.0_ppc64le:*:*:*:*:*:*:* |
|
| Vendors & Products |
Keylime
Keylime keylime Redhat enterprise Linux For Arm 64 Redhat enterprise Linux For Arm 64 Eus Redhat enterprise Linux For Ibm Z Systems Redhat enterprise Linux For Ibm Z Systems Eus Redhat enterprise Linux For Power Little Endian Redhat enterprise Linux For Power Little Endian Eus |
Mon, 09 Feb 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat enterprise Linux Eus
|
|
| CPEs | cpe:/o:redhat:enterprise_linux_eus:10.0 | |
| Vendors & Products |
Redhat enterprise Linux Eus
|
|
| References |
|
Mon, 09 Feb 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/o:redhat:enterprise_linux:9 |
cpe:/a:redhat:enterprise_linux:9::appstream cpe:/o:redhat:enterprise_linux:10.1 |
| References |
|
Sat, 07 Feb 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Fri, 06 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 06 Feb 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in Keylime. The Keylime registrar, since version 7.12.0, does not enforce client-side Transport Layer Security (TLS) authentication. This authentication bypass vulnerability allows unauthenticated clients with network access to perform administrative operations, including listing agents, retrieving public Trusted Platform Module (TPM) data, and deleting agents, by connecting without presenting a client certificate. | |
| Title | Keylime: keylime: authentication bypass allows unauthorized administrative operations due to missing client-side tls authentication | |
| First Time appeared |
Redhat
Redhat enterprise Linux |
|
| Weaknesses | CWE-322 | |
| CPEs | cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:9 |
|
| Vendors & Products |
Redhat
Redhat enterprise Linux |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-03-05T21:48:12.328Z
Reserved: 2026-01-30T17:00:54.761Z
Link: CVE-2026-1709
Updated: 2026-02-06T19:38:25.955Z
Status : Analyzed
Published: 2026-02-06T20:16:09.193
Modified: 2026-03-05T20:58:02.720
Link: CVE-2026-1709
OpenCVE Enrichment
No data.
Github GHSA