| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-4jqp-9qjv-57m2 | Keylime Missing Authentication for Critical Function and Improper Authentication |
Solution
No solution given by the vendor.
Workaround
Restrict network access to the Keylime registrar's HTTPS port (default 8891) to only trusted verifier and tenant hosts using firewall rules. Alternatively, deploy a reverse proxy (e.g., Nginx, HAProxy) in front of the registrar to enforce client certificate authentication. Ensure any changes to firewall rules or proxy configurations are reloaded or services are restarted for the mitigation to take effect.
Fri, 06 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 06 Feb 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in Keylime. The Keylime registrar, since version 7.12.0, does not enforce client-side Transport Layer Security (TLS) authentication. This authentication bypass vulnerability allows unauthenticated clients with network access to perform administrative operations, including listing agents, retrieving public Trusted Platform Module (TPM) data, and deleting agents, by connecting without presenting a client certificate. | |
| Title | Keylime: keylime: authentication bypass allows unauthorized administrative operations due to missing client-side tls authentication | |
| First Time appeared |
Redhat
Redhat enterprise Linux |
|
| Weaknesses | CWE-322 | |
| CPEs | cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:9 |
|
| Vendors & Products |
Redhat
Redhat enterprise Linux |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-02-06T19:38:39.749Z
Reserved: 2026-01-30T17:00:54.761Z
Link: CVE-2026-1709
Updated: 2026-02-06T19:38:25.955Z
Status : Awaiting Analysis
Published: 2026-02-06T20:16:09.193
Modified: 2026-02-06T21:57:22.450
Link: CVE-2026-1709
No data.
OpenCVE Enrichment
No data.
Github GHSA