We recommend you upgrade to tough-v0.22.0 / tuftool-v0.15.0.
No analysis available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 24 Apr 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 24 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 24 Apr 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Missing expiration, hash, and length enforcement in delegated metadata validation in awslabs/tough before tough-v0.22.0 allows remote authenticated users with delegated signing authority to bypass TUF specification integrity checks for delegated targets metadata and poison the local metadata cache, because load_delegations does not apply the same validation checks as the top-level targets metadata path. We recommend you upgrade to tough-v0.22.0 / tuftool-v0.15.0. | |
| Title | Missing Delegated Metadata Validation in awslabs/tough | |
| Weaknesses | CWE-345 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: AMZN
Published:
Updated: 2026-04-24T20:13:20.016Z
Reserved: 2026-04-24T16:15:46.781Z
Link: CVE-2026-6967
Updated: 2026-04-24T20:13:08.897Z
Status : Received
Published: 2026-04-24T20:16:29.020
Modified: 2026-04-24T21:16:19.897
Link: CVE-2026-6967
No data.
OpenCVE Enrichment
No data.