Description
Missing expiration, hash, and length enforcement in delegated metadata validation in awslabs/tough before tough-v0.22.0 allows remote authenticated users with delegated signing authority to bypass TUF specification integrity checks for delegated targets metadata and poison the local metadata cache, because load_delegations does not apply the same validation checks as the top-level targets metadata path.

We recommend you upgrade to tough-v0.22.0 / tuftool-v0.15.0.
Published: 2026-04-24
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Integrity Compromise
Action: Immediate Patch
AI Analysis

Impact

A flaw in the delegated metadata validation in awslabs/tough before version 0.22.0 allows an attacker who is a remote authenticated user with delegated signing authority to bypass TUF specification integrity checks. Because the load_delegations routine does not enforce expiration, hash, or length checks, the attacker can poison the local metadata cache with forged metadata. This violates the integrity guarantees expected from TUF and is classified as a CWE‑345 weakness.

Affected Systems

Affects the AWS: tough and AWS: tuftool packages for all versions earlier than tough‑v0.22.0 and tuftool‑v0.15.0. Any deployment that relies on these tools to download or validate software updates from a TUF repository is vulnerable.

Risk and Exploitability

The CVSS score of 7.1 indicates high severity. The EPSS score is below 1%, suggesting a very low probability that the vulnerability is actively exploited in the wild. The condition requires the attacker to be an authenticated user with delegated signing authority, so the risk is limited to those with such privileges and to environments that trust delegated metadata without additional safeguards. The vulnerability is not listed in CISA’s KEV catalog.

Generated by OpenCVE AI on April 28, 2026 at 05:46 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update tough and tuftool packages to the patched releases v0.22.0 and v0.15.0
  • Re‑build or refresh the local metadata cache to remove any potentially poisoned entries
  • Configure the system to enforce expiration, hash, or length validation on all delegated metadata, using available tooling or custom checks

Generated by OpenCVE AI on April 28, 2026 at 05:46 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-4v58-8p28-2rq3 awslabs/tough is Missing Delegated Metadata Validation
History

Wed, 06 May 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Amazon
Amazon tough
Amazon tuftool
CPEs cpe:2.3:a:amazon:tough:*:*:*:*:*:rust:*:*
cpe:2.3:a:amazon:tuftool:*:*:*:*:*:rust:*:*
Vendors & Products Amazon
Amazon tough
Amazon tuftool

Tue, 28 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Aws
Aws tough
Aws tuftool
Vendors & Products Aws
Aws tough
Aws tuftool

Fri, 24 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 24 Apr 2026 20:45:00 +0000


Fri, 24 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
Description Missing expiration, hash, and length enforcement in delegated metadata validation in awslabs/tough before tough-v0.22.0 allows remote authenticated users with delegated signing authority to bypass TUF specification integrity checks for delegated targets metadata and poison the local metadata cache, because load_delegations does not apply the same validation checks as the top-level targets metadata path. We recommend you upgrade to tough-v0.22.0 / tuftool-v0.15.0.
Title Missing Delegated Metadata Validation in awslabs/tough
Weaknesses CWE-345
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L'}

cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: AMZN

Published:

Updated: 2026-04-24T20:13:20.016Z

Reserved: 2026-04-24T16:15:46.781Z

Link: CVE-2026-6967

cve-icon Vulnrichment

Updated: 2026-04-24T20:13:08.897Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-24T20:16:29.020

Modified: 2026-05-06T15:32:38.257

Link: CVE-2026-6967

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T09:17:49Z

Weaknesses