Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-1709 (GCVE-0-2026-1709)
Vulnerability from cvelistv5 – Published: 2026-02-06 19:13 – Updated: 2026-02-09 15:27- CWE-322 - Key Exchange without Entity Authentication
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux 10 |
Unaffected:
0:7.12.1-11.el10_1.4 , < *
(rpm)
cpe:/o:redhat:enterprise_linux:10.1 |
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-1709",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-02-06T19:38:04.458253Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-06T19:38:39.749Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:10.1"
],
"defaultStatus": "affected",
"packageName": "keylime",
"product": "Red Hat Enterprise Linux 10",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:7.12.1-11.el10_1.4",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux_eus:10.0"
],
"defaultStatus": "affected",
"packageName": "keylime",
"product": "Red Hat Enterprise Linux 10.0 Extended Update Support",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:7.12.1-2.el10_0.5",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:enterprise_linux:9::appstream"
],
"defaultStatus": "affected",
"packageName": "keylime",
"product": "Red Hat Enterprise Linux 9",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:7.12.1-11.el9_7.4",
"versionType": "rpm"
}
]
}
],
"datePublic": "2026-02-06T17:45:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in Keylime. The Keylime registrar, since version 7.12.0, does not enforce client-side Transport Layer Security (TLS) authentication. This authentication bypass vulnerability allows unauthenticated clients with network access to perform administrative operations, including listing agents, retrieving public Trusted Platform Module (TPM) data, and deleting agents, by connecting without presenting a client certificate."
}
],
"metrics": [
{
"other": {
"content": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"value": "Critical"
},
"type": "Red Hat severity rating"
}
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-322",
"description": "Key Exchange without Entity Authentication",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-09T15:27:42.142Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "RHSA-2026:2224",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:2224"
},
{
"name": "RHSA-2026:2225",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:2225"
},
{
"name": "RHSA-2026:2298",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:2298"
},
{
"tags": [
"vdb-entry",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/security/cve/CVE-2026-1709"
},
{
"name": "RHBZ#2435514",
"tags": [
"issue-tracking",
"x_refsource_REDHAT"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2435514"
}
],
"timeline": [
{
"lang": "en",
"time": "2026-01-30T00:00:00+00:00",
"value": "Reported to Red Hat."
},
{
"lang": "en",
"time": "2026-02-06T17:45:00+00:00",
"value": "Made public."
}
],
"title": "Keylime: keylime: authentication bypass allows unauthorized administrative operations due to missing client-side tls authentication",
"workarounds": [
{
"lang": "en",
"value": "Restrict network access to the Keylime registrar\u0027s HTTPS port (default 8891) to only trusted verifier and tenant hosts using firewall rules. \nAlternatively, deploy a reverse proxy (e.g., Nginx, HAProxy) in front of the registrar to enforce client certificate authentication. \nEnsure any changes to firewall rules or proxy configurations are reloaded or services are restarted for the mitigation to take effect."
}
],
"x_generator": {
"engine": "cvelib 1.8.0"
},
"x_redhatCweChain": "CWE-322: Key Exchange without Entity Authentication"
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2026-1709",
"datePublished": "2026-02-06T19:13:27.695Z",
"dateReserved": "2026-01-30T17:00:54.761Z",
"dateUpdated": "2026-02-09T15:27:42.142Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2026-1709\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2026-02-06T20:16:09.193\",\"lastModified\":\"2026-02-09T10:15:57.377\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in Keylime. The Keylime registrar, since version 7.12.0, does not enforce client-side Transport Layer Security (TLS) authentication. This authentication bypass vulnerability allows unauthenticated clients with network access to perform administrative operations, including listing agents, retrieving public Trusted Platform Module (TPM) data, and deleting agents, by connecting without presenting a client certificate.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H\",\"baseScore\":9.4,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.5}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-322\"}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2026:2224\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:2225\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:2298\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/security/cve/CVE-2026-1709\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2435514\",\"source\":\"secalert@redhat.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-1709\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-02-06T19:38:04.458253Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-02-06T19:38:25.955Z\"}}], \"cna\": {\"title\": \"Keylime: keylime: authentication bypass allows unauthorized administrative operations due to missing client-side tls authentication\", \"metrics\": [{\"other\": {\"type\": \"Red Hat severity rating\", \"content\": {\"value\": \"Critical\", \"namespace\": \"https://access.redhat.com/security/updates/classification/\"}}}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.4, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}], \"affected\": [{\"cpes\": [\"cpe:/o:redhat:enterprise_linux:10.1\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 10\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:7.12.1-11.el10_1.4\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"keylime\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux_eus:10.0\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 10.0 Extended Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:7.12.1-2.el10_0.5\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"keylime\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:9::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:7.12.1-11.el9_7.4\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"keylime\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2026-01-30T00:00:00+00:00\", \"value\": \"Reported to Red Hat.\"}, {\"lang\": \"en\", \"time\": \"2026-02-06T17:45:00+00:00\", \"value\": \"Made public.\"}], \"datePublic\": \"2026-02-06T17:45:00.000Z\", \"references\": [{\"url\": \"https://access.redhat.com/errata/RHSA-2026:2224\", \"name\": \"RHSA-2026:2224\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:2225\", \"name\": \"RHSA-2026:2225\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:2298\", \"name\": \"RHSA-2026:2298\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/security/cve/CVE-2026-1709\", \"tags\": [\"vdb-entry\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2435514\", \"name\": \"RHBZ#2435514\", \"tags\": [\"issue-tracking\", \"x_refsource_REDHAT\"]}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"Restrict network access to the Keylime registrar\u0027s HTTPS port (default 8891) to only trusted verifier and tenant hosts using firewall rules. \\nAlternatively, deploy a reverse proxy (e.g., Nginx, HAProxy) in front of the registrar to enforce client certificate authentication. \\nEnsure any changes to firewall rules or proxy configurations are reloaded or services are restarted for the mitigation to take effect.\"}], \"x_generator\": {\"engine\": \"cvelib 1.8.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A flaw was found in Keylime. The Keylime registrar, since version 7.12.0, does not enforce client-side Transport Layer Security (TLS) authentication. This authentication bypass vulnerability allows unauthenticated clients with network access to perform administrative operations, including listing agents, retrieving public Trusted Platform Module (TPM) data, and deleting agents, by connecting without presenting a client certificate.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-322\", \"description\": \"Key Exchange without Entity Authentication\"}]}], \"providerMetadata\": {\"orgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"shortName\": \"redhat\", \"dateUpdated\": \"2026-02-09T15:27:42.142Z\"}, \"x_redhatCweChain\": \"CWE-322: Key Exchange without Entity Authentication\"}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-1709\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-02-09T15:27:42.142Z\", \"dateReserved\": \"2026-01-30T17:00:54.761Z\", \"assignerOrgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"datePublished\": \"2026-02-06T19:13:27.695Z\", \"assignerShortName\": \"redhat\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
RHSA-2026:2224
Vulnerability from csaf_redhat - Published: 2026-02-09 02:49 - Updated: 2026-02-09 15:28Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for keylime is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Keylime is a TPM based highly scalable remote boot attestation and runtime integrity measurement solution.\n\nSecurity Fix(es):\n\n* keylime: Keylime: Authentication bypass allows unauthorized administrative operations due to missing client-side TLS authentication (CVE-2026-1709)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2224",
"url": "https://access.redhat.com/errata/RHSA-2026:2224"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "2435514",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2435514"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2224.json"
}
],
"title": "Red Hat Security Advisory: keylime security update",
"tracking": {
"current_release_date": "2026-02-09T15:28:53+00:00",
"generator": {
"date": "2026-02-09T15:28:53+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2224",
"initial_release_date": "2026-02-09T02:49:17+00:00",
"revision_history": [
{
"date": "2026-02-09T02:49:17+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-09T02:49:17+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-09T15:28:53+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "keylime-0:7.12.1-11.el9_7.4.src",
"product": {
"name": "keylime-0:7.12.1-11.el9_7.4.src",
"product_id": "keylime-0:7.12.1-11.el9_7.4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime@7.12.1-11.el9_7.4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "keylime-0:7.12.1-11.el9_7.4.aarch64",
"product": {
"name": "keylime-0:7.12.1-11.el9_7.4.aarch64",
"product_id": "keylime-0:7.12.1-11.el9_7.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime@7.12.1-11.el9_7.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "keylime-base-0:7.12.1-11.el9_7.4.aarch64",
"product": {
"name": "keylime-base-0:7.12.1-11.el9_7.4.aarch64",
"product_id": "keylime-base-0:7.12.1-11.el9_7.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-base@7.12.1-11.el9_7.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "keylime-registrar-0:7.12.1-11.el9_7.4.aarch64",
"product": {
"name": "keylime-registrar-0:7.12.1-11.el9_7.4.aarch64",
"product_id": "keylime-registrar-0:7.12.1-11.el9_7.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-registrar@7.12.1-11.el9_7.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "keylime-tenant-0:7.12.1-11.el9_7.4.aarch64",
"product": {
"name": "keylime-tenant-0:7.12.1-11.el9_7.4.aarch64",
"product_id": "keylime-tenant-0:7.12.1-11.el9_7.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-tenant@7.12.1-11.el9_7.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "keylime-verifier-0:7.12.1-11.el9_7.4.aarch64",
"product": {
"name": "keylime-verifier-0:7.12.1-11.el9_7.4.aarch64",
"product_id": "keylime-verifier-0:7.12.1-11.el9_7.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-verifier@7.12.1-11.el9_7.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-keylime-0:7.12.1-11.el9_7.4.aarch64",
"product": {
"name": "python3-keylime-0:7.12.1-11.el9_7.4.aarch64",
"product_id": "python3-keylime-0:7.12.1-11.el9_7.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-keylime@7.12.1-11.el9_7.4?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "keylime-0:7.12.1-11.el9_7.4.ppc64le",
"product": {
"name": "keylime-0:7.12.1-11.el9_7.4.ppc64le",
"product_id": "keylime-0:7.12.1-11.el9_7.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime@7.12.1-11.el9_7.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "keylime-base-0:7.12.1-11.el9_7.4.ppc64le",
"product": {
"name": "keylime-base-0:7.12.1-11.el9_7.4.ppc64le",
"product_id": "keylime-base-0:7.12.1-11.el9_7.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-base@7.12.1-11.el9_7.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "keylime-registrar-0:7.12.1-11.el9_7.4.ppc64le",
"product": {
"name": "keylime-registrar-0:7.12.1-11.el9_7.4.ppc64le",
"product_id": "keylime-registrar-0:7.12.1-11.el9_7.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-registrar@7.12.1-11.el9_7.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "keylime-tenant-0:7.12.1-11.el9_7.4.ppc64le",
"product": {
"name": "keylime-tenant-0:7.12.1-11.el9_7.4.ppc64le",
"product_id": "keylime-tenant-0:7.12.1-11.el9_7.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-tenant@7.12.1-11.el9_7.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "keylime-verifier-0:7.12.1-11.el9_7.4.ppc64le",
"product": {
"name": "keylime-verifier-0:7.12.1-11.el9_7.4.ppc64le",
"product_id": "keylime-verifier-0:7.12.1-11.el9_7.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-verifier@7.12.1-11.el9_7.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-keylime-0:7.12.1-11.el9_7.4.ppc64le",
"product": {
"name": "python3-keylime-0:7.12.1-11.el9_7.4.ppc64le",
"product_id": "python3-keylime-0:7.12.1-11.el9_7.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-keylime@7.12.1-11.el9_7.4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "keylime-0:7.12.1-11.el9_7.4.x86_64",
"product": {
"name": "keylime-0:7.12.1-11.el9_7.4.x86_64",
"product_id": "keylime-0:7.12.1-11.el9_7.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime@7.12.1-11.el9_7.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "keylime-base-0:7.12.1-11.el9_7.4.x86_64",
"product": {
"name": "keylime-base-0:7.12.1-11.el9_7.4.x86_64",
"product_id": "keylime-base-0:7.12.1-11.el9_7.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-base@7.12.1-11.el9_7.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "keylime-registrar-0:7.12.1-11.el9_7.4.x86_64",
"product": {
"name": "keylime-registrar-0:7.12.1-11.el9_7.4.x86_64",
"product_id": "keylime-registrar-0:7.12.1-11.el9_7.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-registrar@7.12.1-11.el9_7.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "keylime-tenant-0:7.12.1-11.el9_7.4.x86_64",
"product": {
"name": "keylime-tenant-0:7.12.1-11.el9_7.4.x86_64",
"product_id": "keylime-tenant-0:7.12.1-11.el9_7.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-tenant@7.12.1-11.el9_7.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "keylime-verifier-0:7.12.1-11.el9_7.4.x86_64",
"product": {
"name": "keylime-verifier-0:7.12.1-11.el9_7.4.x86_64",
"product_id": "keylime-verifier-0:7.12.1-11.el9_7.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-verifier@7.12.1-11.el9_7.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-keylime-0:7.12.1-11.el9_7.4.x86_64",
"product": {
"name": "python3-keylime-0:7.12.1-11.el9_7.4.x86_64",
"product_id": "python3-keylime-0:7.12.1-11.el9_7.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-keylime@7.12.1-11.el9_7.4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "keylime-0:7.12.1-11.el9_7.4.s390x",
"product": {
"name": "keylime-0:7.12.1-11.el9_7.4.s390x",
"product_id": "keylime-0:7.12.1-11.el9_7.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime@7.12.1-11.el9_7.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "keylime-base-0:7.12.1-11.el9_7.4.s390x",
"product": {
"name": "keylime-base-0:7.12.1-11.el9_7.4.s390x",
"product_id": "keylime-base-0:7.12.1-11.el9_7.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-base@7.12.1-11.el9_7.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "keylime-registrar-0:7.12.1-11.el9_7.4.s390x",
"product": {
"name": "keylime-registrar-0:7.12.1-11.el9_7.4.s390x",
"product_id": "keylime-registrar-0:7.12.1-11.el9_7.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-registrar@7.12.1-11.el9_7.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "keylime-tenant-0:7.12.1-11.el9_7.4.s390x",
"product": {
"name": "keylime-tenant-0:7.12.1-11.el9_7.4.s390x",
"product_id": "keylime-tenant-0:7.12.1-11.el9_7.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-tenant@7.12.1-11.el9_7.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "keylime-verifier-0:7.12.1-11.el9_7.4.s390x",
"product": {
"name": "keylime-verifier-0:7.12.1-11.el9_7.4.s390x",
"product_id": "keylime-verifier-0:7.12.1-11.el9_7.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-verifier@7.12.1-11.el9_7.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-keylime-0:7.12.1-11.el9_7.4.s390x",
"product": {
"name": "python3-keylime-0:7.12.1-11.el9_7.4.s390x",
"product_id": "python3-keylime-0:7.12.1-11.el9_7.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-keylime@7.12.1-11.el9_7.4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "keylime-selinux-0:7.12.1-11.el9_7.4.noarch",
"product": {
"name": "keylime-selinux-0:7.12.1-11.el9_7.4.noarch",
"product_id": "keylime-selinux-0:7.12.1-11.el9_7.4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-selinux@7.12.1-11.el9_7.4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-0:7.12.1-11.el9_7.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:keylime-0:7.12.1-11.el9_7.4.aarch64"
},
"product_reference": "keylime-0:7.12.1-11.el9_7.4.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-0:7.12.1-11.el9_7.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:keylime-0:7.12.1-11.el9_7.4.ppc64le"
},
"product_reference": "keylime-0:7.12.1-11.el9_7.4.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-0:7.12.1-11.el9_7.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:keylime-0:7.12.1-11.el9_7.4.s390x"
},
"product_reference": "keylime-0:7.12.1-11.el9_7.4.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-0:7.12.1-11.el9_7.4.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:keylime-0:7.12.1-11.el9_7.4.src"
},
"product_reference": "keylime-0:7.12.1-11.el9_7.4.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-0:7.12.1-11.el9_7.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:keylime-0:7.12.1-11.el9_7.4.x86_64"
},
"product_reference": "keylime-0:7.12.1-11.el9_7.4.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-base-0:7.12.1-11.el9_7.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:keylime-base-0:7.12.1-11.el9_7.4.aarch64"
},
"product_reference": "keylime-base-0:7.12.1-11.el9_7.4.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-base-0:7.12.1-11.el9_7.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:keylime-base-0:7.12.1-11.el9_7.4.ppc64le"
},
"product_reference": "keylime-base-0:7.12.1-11.el9_7.4.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-base-0:7.12.1-11.el9_7.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:keylime-base-0:7.12.1-11.el9_7.4.s390x"
},
"product_reference": "keylime-base-0:7.12.1-11.el9_7.4.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-base-0:7.12.1-11.el9_7.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:keylime-base-0:7.12.1-11.el9_7.4.x86_64"
},
"product_reference": "keylime-base-0:7.12.1-11.el9_7.4.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-registrar-0:7.12.1-11.el9_7.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:keylime-registrar-0:7.12.1-11.el9_7.4.aarch64"
},
"product_reference": "keylime-registrar-0:7.12.1-11.el9_7.4.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-registrar-0:7.12.1-11.el9_7.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:keylime-registrar-0:7.12.1-11.el9_7.4.ppc64le"
},
"product_reference": "keylime-registrar-0:7.12.1-11.el9_7.4.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-registrar-0:7.12.1-11.el9_7.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:keylime-registrar-0:7.12.1-11.el9_7.4.s390x"
},
"product_reference": "keylime-registrar-0:7.12.1-11.el9_7.4.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-registrar-0:7.12.1-11.el9_7.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:keylime-registrar-0:7.12.1-11.el9_7.4.x86_64"
},
"product_reference": "keylime-registrar-0:7.12.1-11.el9_7.4.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-selinux-0:7.12.1-11.el9_7.4.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:keylime-selinux-0:7.12.1-11.el9_7.4.noarch"
},
"product_reference": "keylime-selinux-0:7.12.1-11.el9_7.4.noarch",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-tenant-0:7.12.1-11.el9_7.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:keylime-tenant-0:7.12.1-11.el9_7.4.aarch64"
},
"product_reference": "keylime-tenant-0:7.12.1-11.el9_7.4.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-tenant-0:7.12.1-11.el9_7.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:keylime-tenant-0:7.12.1-11.el9_7.4.ppc64le"
},
"product_reference": "keylime-tenant-0:7.12.1-11.el9_7.4.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-tenant-0:7.12.1-11.el9_7.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:keylime-tenant-0:7.12.1-11.el9_7.4.s390x"
},
"product_reference": "keylime-tenant-0:7.12.1-11.el9_7.4.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-tenant-0:7.12.1-11.el9_7.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:keylime-tenant-0:7.12.1-11.el9_7.4.x86_64"
},
"product_reference": "keylime-tenant-0:7.12.1-11.el9_7.4.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-verifier-0:7.12.1-11.el9_7.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:keylime-verifier-0:7.12.1-11.el9_7.4.aarch64"
},
"product_reference": "keylime-verifier-0:7.12.1-11.el9_7.4.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-verifier-0:7.12.1-11.el9_7.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:keylime-verifier-0:7.12.1-11.el9_7.4.ppc64le"
},
"product_reference": "keylime-verifier-0:7.12.1-11.el9_7.4.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-verifier-0:7.12.1-11.el9_7.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:keylime-verifier-0:7.12.1-11.el9_7.4.s390x"
},
"product_reference": "keylime-verifier-0:7.12.1-11.el9_7.4.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-verifier-0:7.12.1-11.el9_7.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:keylime-verifier-0:7.12.1-11.el9_7.4.x86_64"
},
"product_reference": "keylime-verifier-0:7.12.1-11.el9_7.4.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-keylime-0:7.12.1-11.el9_7.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:python3-keylime-0:7.12.1-11.el9_7.4.aarch64"
},
"product_reference": "python3-keylime-0:7.12.1-11.el9_7.4.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-keylime-0:7.12.1-11.el9_7.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:python3-keylime-0:7.12.1-11.el9_7.4.ppc64le"
},
"product_reference": "python3-keylime-0:7.12.1-11.el9_7.4.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-keylime-0:7.12.1-11.el9_7.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:python3-keylime-0:7.12.1-11.el9_7.4.s390x"
},
"product_reference": "python3-keylime-0:7.12.1-11.el9_7.4.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-keylime-0:7.12.1-11.el9_7.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:python3-keylime-0:7.12.1-11.el9_7.4.x86_64"
},
"product_reference": "python3-keylime-0:7.12.1-11.el9_7.4.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-1709",
"cwe": {
"id": "CWE-322",
"name": "Key Exchange without Entity Authentication"
},
"discovery_date": "2026-01-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2435514"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Keylime. The Keylime registrar, since version 7.12.0, does not enforce client-side Transport Layer Security (TLS) authentication. This authentication bypass vulnerability allows unauthenticated clients with network access to perform administrative operations, including listing agents, retrieving public Trusted Platform Module (TPM) data, and deleting agents, by connecting without presenting a client certificate.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "keylime: Keylime: Authentication bypass allows unauthorized administrative operations due to missing client-side TLS authentication",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a Critical authentication bypass flaw in the Keylime registrar, affecting versions 7.12.0 and later. The registrar fails to enforce client-side TLS authentication, enabling unauthenticated clients with network access to perform administrative actions such as listing or deleting agents and retrieving TPM data. Exploitation requires direct network access to the registrar\u0027s HTTPS port (default 8891). Keylime packages shipped in RHEL-9.6 and earlier are not affected, as they never shipped the version which introduced this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:keylime-0:7.12.1-11.el9_7.4.aarch64",
"AppStream-9.7.0.Z.MAIN:keylime-0:7.12.1-11.el9_7.4.ppc64le",
"AppStream-9.7.0.Z.MAIN:keylime-0:7.12.1-11.el9_7.4.s390x",
"AppStream-9.7.0.Z.MAIN:keylime-0:7.12.1-11.el9_7.4.src",
"AppStream-9.7.0.Z.MAIN:keylime-0:7.12.1-11.el9_7.4.x86_64",
"AppStream-9.7.0.Z.MAIN:keylime-base-0:7.12.1-11.el9_7.4.aarch64",
"AppStream-9.7.0.Z.MAIN:keylime-base-0:7.12.1-11.el9_7.4.ppc64le",
"AppStream-9.7.0.Z.MAIN:keylime-base-0:7.12.1-11.el9_7.4.s390x",
"AppStream-9.7.0.Z.MAIN:keylime-base-0:7.12.1-11.el9_7.4.x86_64",
"AppStream-9.7.0.Z.MAIN:keylime-registrar-0:7.12.1-11.el9_7.4.aarch64",
"AppStream-9.7.0.Z.MAIN:keylime-registrar-0:7.12.1-11.el9_7.4.ppc64le",
"AppStream-9.7.0.Z.MAIN:keylime-registrar-0:7.12.1-11.el9_7.4.s390x",
"AppStream-9.7.0.Z.MAIN:keylime-registrar-0:7.12.1-11.el9_7.4.x86_64",
"AppStream-9.7.0.Z.MAIN:keylime-selinux-0:7.12.1-11.el9_7.4.noarch",
"AppStream-9.7.0.Z.MAIN:keylime-tenant-0:7.12.1-11.el9_7.4.aarch64",
"AppStream-9.7.0.Z.MAIN:keylime-tenant-0:7.12.1-11.el9_7.4.ppc64le",
"AppStream-9.7.0.Z.MAIN:keylime-tenant-0:7.12.1-11.el9_7.4.s390x",
"AppStream-9.7.0.Z.MAIN:keylime-tenant-0:7.12.1-11.el9_7.4.x86_64",
"AppStream-9.7.0.Z.MAIN:keylime-verifier-0:7.12.1-11.el9_7.4.aarch64",
"AppStream-9.7.0.Z.MAIN:keylime-verifier-0:7.12.1-11.el9_7.4.ppc64le",
"AppStream-9.7.0.Z.MAIN:keylime-verifier-0:7.12.1-11.el9_7.4.s390x",
"AppStream-9.7.0.Z.MAIN:keylime-verifier-0:7.12.1-11.el9_7.4.x86_64",
"AppStream-9.7.0.Z.MAIN:python3-keylime-0:7.12.1-11.el9_7.4.aarch64",
"AppStream-9.7.0.Z.MAIN:python3-keylime-0:7.12.1-11.el9_7.4.ppc64le",
"AppStream-9.7.0.Z.MAIN:python3-keylime-0:7.12.1-11.el9_7.4.s390x",
"AppStream-9.7.0.Z.MAIN:python3-keylime-0:7.12.1-11.el9_7.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1709"
},
{
"category": "external",
"summary": "RHBZ#2435514",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2435514"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1709",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1709"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1709",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1709"
}
],
"release_date": "2026-02-06T17:45:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-09T02:49:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:keylime-0:7.12.1-11.el9_7.4.aarch64",
"AppStream-9.7.0.Z.MAIN:keylime-0:7.12.1-11.el9_7.4.ppc64le",
"AppStream-9.7.0.Z.MAIN:keylime-0:7.12.1-11.el9_7.4.s390x",
"AppStream-9.7.0.Z.MAIN:keylime-0:7.12.1-11.el9_7.4.src",
"AppStream-9.7.0.Z.MAIN:keylime-0:7.12.1-11.el9_7.4.x86_64",
"AppStream-9.7.0.Z.MAIN:keylime-base-0:7.12.1-11.el9_7.4.aarch64",
"AppStream-9.7.0.Z.MAIN:keylime-base-0:7.12.1-11.el9_7.4.ppc64le",
"AppStream-9.7.0.Z.MAIN:keylime-base-0:7.12.1-11.el9_7.4.s390x",
"AppStream-9.7.0.Z.MAIN:keylime-base-0:7.12.1-11.el9_7.4.x86_64",
"AppStream-9.7.0.Z.MAIN:keylime-registrar-0:7.12.1-11.el9_7.4.aarch64",
"AppStream-9.7.0.Z.MAIN:keylime-registrar-0:7.12.1-11.el9_7.4.ppc64le",
"AppStream-9.7.0.Z.MAIN:keylime-registrar-0:7.12.1-11.el9_7.4.s390x",
"AppStream-9.7.0.Z.MAIN:keylime-registrar-0:7.12.1-11.el9_7.4.x86_64",
"AppStream-9.7.0.Z.MAIN:keylime-selinux-0:7.12.1-11.el9_7.4.noarch",
"AppStream-9.7.0.Z.MAIN:keylime-tenant-0:7.12.1-11.el9_7.4.aarch64",
"AppStream-9.7.0.Z.MAIN:keylime-tenant-0:7.12.1-11.el9_7.4.ppc64le",
"AppStream-9.7.0.Z.MAIN:keylime-tenant-0:7.12.1-11.el9_7.4.s390x",
"AppStream-9.7.0.Z.MAIN:keylime-tenant-0:7.12.1-11.el9_7.4.x86_64",
"AppStream-9.7.0.Z.MAIN:keylime-verifier-0:7.12.1-11.el9_7.4.aarch64",
"AppStream-9.7.0.Z.MAIN:keylime-verifier-0:7.12.1-11.el9_7.4.ppc64le",
"AppStream-9.7.0.Z.MAIN:keylime-verifier-0:7.12.1-11.el9_7.4.s390x",
"AppStream-9.7.0.Z.MAIN:keylime-verifier-0:7.12.1-11.el9_7.4.x86_64",
"AppStream-9.7.0.Z.MAIN:python3-keylime-0:7.12.1-11.el9_7.4.aarch64",
"AppStream-9.7.0.Z.MAIN:python3-keylime-0:7.12.1-11.el9_7.4.ppc64le",
"AppStream-9.7.0.Z.MAIN:python3-keylime-0:7.12.1-11.el9_7.4.s390x",
"AppStream-9.7.0.Z.MAIN:python3-keylime-0:7.12.1-11.el9_7.4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2224"
},
{
"category": "workaround",
"details": "Restrict network access to the Keylime registrar\u0027s HTTPS port (default 8891) to only trusted verifier and tenant hosts using firewall rules. \nAlternatively, deploy a reverse proxy (e.g., Nginx, HAProxy) in front of the registrar to enforce client certificate authentication. \nEnsure any changes to firewall rules or proxy configurations are reloaded or services are restarted for the mitigation to take effect.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:keylime-0:7.12.1-11.el9_7.4.aarch64",
"AppStream-9.7.0.Z.MAIN:keylime-0:7.12.1-11.el9_7.4.ppc64le",
"AppStream-9.7.0.Z.MAIN:keylime-0:7.12.1-11.el9_7.4.s390x",
"AppStream-9.7.0.Z.MAIN:keylime-0:7.12.1-11.el9_7.4.src",
"AppStream-9.7.0.Z.MAIN:keylime-0:7.12.1-11.el9_7.4.x86_64",
"AppStream-9.7.0.Z.MAIN:keylime-base-0:7.12.1-11.el9_7.4.aarch64",
"AppStream-9.7.0.Z.MAIN:keylime-base-0:7.12.1-11.el9_7.4.ppc64le",
"AppStream-9.7.0.Z.MAIN:keylime-base-0:7.12.1-11.el9_7.4.s390x",
"AppStream-9.7.0.Z.MAIN:keylime-base-0:7.12.1-11.el9_7.4.x86_64",
"AppStream-9.7.0.Z.MAIN:keylime-registrar-0:7.12.1-11.el9_7.4.aarch64",
"AppStream-9.7.0.Z.MAIN:keylime-registrar-0:7.12.1-11.el9_7.4.ppc64le",
"AppStream-9.7.0.Z.MAIN:keylime-registrar-0:7.12.1-11.el9_7.4.s390x",
"AppStream-9.7.0.Z.MAIN:keylime-registrar-0:7.12.1-11.el9_7.4.x86_64",
"AppStream-9.7.0.Z.MAIN:keylime-selinux-0:7.12.1-11.el9_7.4.noarch",
"AppStream-9.7.0.Z.MAIN:keylime-tenant-0:7.12.1-11.el9_7.4.aarch64",
"AppStream-9.7.0.Z.MAIN:keylime-tenant-0:7.12.1-11.el9_7.4.ppc64le",
"AppStream-9.7.0.Z.MAIN:keylime-tenant-0:7.12.1-11.el9_7.4.s390x",
"AppStream-9.7.0.Z.MAIN:keylime-tenant-0:7.12.1-11.el9_7.4.x86_64",
"AppStream-9.7.0.Z.MAIN:keylime-verifier-0:7.12.1-11.el9_7.4.aarch64",
"AppStream-9.7.0.Z.MAIN:keylime-verifier-0:7.12.1-11.el9_7.4.ppc64le",
"AppStream-9.7.0.Z.MAIN:keylime-verifier-0:7.12.1-11.el9_7.4.s390x",
"AppStream-9.7.0.Z.MAIN:keylime-verifier-0:7.12.1-11.el9_7.4.x86_64",
"AppStream-9.7.0.Z.MAIN:python3-keylime-0:7.12.1-11.el9_7.4.aarch64",
"AppStream-9.7.0.Z.MAIN:python3-keylime-0:7.12.1-11.el9_7.4.ppc64le",
"AppStream-9.7.0.Z.MAIN:python3-keylime-0:7.12.1-11.el9_7.4.s390x",
"AppStream-9.7.0.Z.MAIN:python3-keylime-0:7.12.1-11.el9_7.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:keylime-0:7.12.1-11.el9_7.4.aarch64",
"AppStream-9.7.0.Z.MAIN:keylime-0:7.12.1-11.el9_7.4.ppc64le",
"AppStream-9.7.0.Z.MAIN:keylime-0:7.12.1-11.el9_7.4.s390x",
"AppStream-9.7.0.Z.MAIN:keylime-0:7.12.1-11.el9_7.4.src",
"AppStream-9.7.0.Z.MAIN:keylime-0:7.12.1-11.el9_7.4.x86_64",
"AppStream-9.7.0.Z.MAIN:keylime-base-0:7.12.1-11.el9_7.4.aarch64",
"AppStream-9.7.0.Z.MAIN:keylime-base-0:7.12.1-11.el9_7.4.ppc64le",
"AppStream-9.7.0.Z.MAIN:keylime-base-0:7.12.1-11.el9_7.4.s390x",
"AppStream-9.7.0.Z.MAIN:keylime-base-0:7.12.1-11.el9_7.4.x86_64",
"AppStream-9.7.0.Z.MAIN:keylime-registrar-0:7.12.1-11.el9_7.4.aarch64",
"AppStream-9.7.0.Z.MAIN:keylime-registrar-0:7.12.1-11.el9_7.4.ppc64le",
"AppStream-9.7.0.Z.MAIN:keylime-registrar-0:7.12.1-11.el9_7.4.s390x",
"AppStream-9.7.0.Z.MAIN:keylime-registrar-0:7.12.1-11.el9_7.4.x86_64",
"AppStream-9.7.0.Z.MAIN:keylime-selinux-0:7.12.1-11.el9_7.4.noarch",
"AppStream-9.7.0.Z.MAIN:keylime-tenant-0:7.12.1-11.el9_7.4.aarch64",
"AppStream-9.7.0.Z.MAIN:keylime-tenant-0:7.12.1-11.el9_7.4.ppc64le",
"AppStream-9.7.0.Z.MAIN:keylime-tenant-0:7.12.1-11.el9_7.4.s390x",
"AppStream-9.7.0.Z.MAIN:keylime-tenant-0:7.12.1-11.el9_7.4.x86_64",
"AppStream-9.7.0.Z.MAIN:keylime-verifier-0:7.12.1-11.el9_7.4.aarch64",
"AppStream-9.7.0.Z.MAIN:keylime-verifier-0:7.12.1-11.el9_7.4.ppc64le",
"AppStream-9.7.0.Z.MAIN:keylime-verifier-0:7.12.1-11.el9_7.4.s390x",
"AppStream-9.7.0.Z.MAIN:keylime-verifier-0:7.12.1-11.el9_7.4.x86_64",
"AppStream-9.7.0.Z.MAIN:python3-keylime-0:7.12.1-11.el9_7.4.aarch64",
"AppStream-9.7.0.Z.MAIN:python3-keylime-0:7.12.1-11.el9_7.4.ppc64le",
"AppStream-9.7.0.Z.MAIN:python3-keylime-0:7.12.1-11.el9_7.4.s390x",
"AppStream-9.7.0.Z.MAIN:python3-keylime-0:7.12.1-11.el9_7.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "keylime: Keylime: Authentication bypass allows unauthorized administrative operations due to missing client-side TLS authentication"
}
]
}
RHSA-2026:2298
Vulnerability from csaf_redhat - Published: 2026-02-09 09:44 - Updated: 2026-02-09 15:28Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for keylime is now available for Red Hat Enterprise Linux 10.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Keylime is a TPM based highly scalable remote boot attestation and runtime integrity measurement solution.\n\nSecurity Fix(es):\n\n* keylime: Keylime: Authentication bypass allows unauthorized administrative operations due to missing client-side TLS authentication (CVE-2026-1709)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2298",
"url": "https://access.redhat.com/errata/RHSA-2026:2298"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "2435514",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2435514"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2298.json"
}
],
"title": "Red Hat Security Advisory: keylime security update",
"tracking": {
"current_release_date": "2026-02-09T15:28:56+00:00",
"generator": {
"date": "2026-02-09T15:28:56+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2298",
"initial_release_date": "2026-02-09T09:44:33+00:00",
"revision_history": [
{
"date": "2026-02-09T09:44:33+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-09T09:44:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-09T15:28:56+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux_eus:10.0"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "keylime-0:7.12.1-2.el10_0.5.src",
"product": {
"name": "keylime-0:7.12.1-2.el10_0.5.src",
"product_id": "keylime-0:7.12.1-2.el10_0.5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime@7.12.1-2.el10_0.5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "keylime-0:7.12.1-2.el10_0.5.aarch64",
"product": {
"name": "keylime-0:7.12.1-2.el10_0.5.aarch64",
"product_id": "keylime-0:7.12.1-2.el10_0.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime@7.12.1-2.el10_0.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "keylime-base-0:7.12.1-2.el10_0.5.aarch64",
"product": {
"name": "keylime-base-0:7.12.1-2.el10_0.5.aarch64",
"product_id": "keylime-base-0:7.12.1-2.el10_0.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-base@7.12.1-2.el10_0.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "keylime-registrar-0:7.12.1-2.el10_0.5.aarch64",
"product": {
"name": "keylime-registrar-0:7.12.1-2.el10_0.5.aarch64",
"product_id": "keylime-registrar-0:7.12.1-2.el10_0.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-registrar@7.12.1-2.el10_0.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "keylime-tenant-0:7.12.1-2.el10_0.5.aarch64",
"product": {
"name": "keylime-tenant-0:7.12.1-2.el10_0.5.aarch64",
"product_id": "keylime-tenant-0:7.12.1-2.el10_0.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-tenant@7.12.1-2.el10_0.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "keylime-tools-0:7.12.1-2.el10_0.5.aarch64",
"product": {
"name": "keylime-tools-0:7.12.1-2.el10_0.5.aarch64",
"product_id": "keylime-tools-0:7.12.1-2.el10_0.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-tools@7.12.1-2.el10_0.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "keylime-verifier-0:7.12.1-2.el10_0.5.aarch64",
"product": {
"name": "keylime-verifier-0:7.12.1-2.el10_0.5.aarch64",
"product_id": "keylime-verifier-0:7.12.1-2.el10_0.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-verifier@7.12.1-2.el10_0.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-keylime-0:7.12.1-2.el10_0.5.aarch64",
"product": {
"name": "python3-keylime-0:7.12.1-2.el10_0.5.aarch64",
"product_id": "python3-keylime-0:7.12.1-2.el10_0.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-keylime@7.12.1-2.el10_0.5?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "keylime-0:7.12.1-2.el10_0.5.ppc64le",
"product": {
"name": "keylime-0:7.12.1-2.el10_0.5.ppc64le",
"product_id": "keylime-0:7.12.1-2.el10_0.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime@7.12.1-2.el10_0.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "keylime-base-0:7.12.1-2.el10_0.5.ppc64le",
"product": {
"name": "keylime-base-0:7.12.1-2.el10_0.5.ppc64le",
"product_id": "keylime-base-0:7.12.1-2.el10_0.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-base@7.12.1-2.el10_0.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "keylime-registrar-0:7.12.1-2.el10_0.5.ppc64le",
"product": {
"name": "keylime-registrar-0:7.12.1-2.el10_0.5.ppc64le",
"product_id": "keylime-registrar-0:7.12.1-2.el10_0.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-registrar@7.12.1-2.el10_0.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "keylime-tenant-0:7.12.1-2.el10_0.5.ppc64le",
"product": {
"name": "keylime-tenant-0:7.12.1-2.el10_0.5.ppc64le",
"product_id": "keylime-tenant-0:7.12.1-2.el10_0.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-tenant@7.12.1-2.el10_0.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "keylime-tools-0:7.12.1-2.el10_0.5.ppc64le",
"product": {
"name": "keylime-tools-0:7.12.1-2.el10_0.5.ppc64le",
"product_id": "keylime-tools-0:7.12.1-2.el10_0.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-tools@7.12.1-2.el10_0.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "keylime-verifier-0:7.12.1-2.el10_0.5.ppc64le",
"product": {
"name": "keylime-verifier-0:7.12.1-2.el10_0.5.ppc64le",
"product_id": "keylime-verifier-0:7.12.1-2.el10_0.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-verifier@7.12.1-2.el10_0.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-keylime-0:7.12.1-2.el10_0.5.ppc64le",
"product": {
"name": "python3-keylime-0:7.12.1-2.el10_0.5.ppc64le",
"product_id": "python3-keylime-0:7.12.1-2.el10_0.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-keylime@7.12.1-2.el10_0.5?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "keylime-0:7.12.1-2.el10_0.5.x86_64",
"product": {
"name": "keylime-0:7.12.1-2.el10_0.5.x86_64",
"product_id": "keylime-0:7.12.1-2.el10_0.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime@7.12.1-2.el10_0.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "keylime-base-0:7.12.1-2.el10_0.5.x86_64",
"product": {
"name": "keylime-base-0:7.12.1-2.el10_0.5.x86_64",
"product_id": "keylime-base-0:7.12.1-2.el10_0.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-base@7.12.1-2.el10_0.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "keylime-registrar-0:7.12.1-2.el10_0.5.x86_64",
"product": {
"name": "keylime-registrar-0:7.12.1-2.el10_0.5.x86_64",
"product_id": "keylime-registrar-0:7.12.1-2.el10_0.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-registrar@7.12.1-2.el10_0.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "keylime-tenant-0:7.12.1-2.el10_0.5.x86_64",
"product": {
"name": "keylime-tenant-0:7.12.1-2.el10_0.5.x86_64",
"product_id": "keylime-tenant-0:7.12.1-2.el10_0.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-tenant@7.12.1-2.el10_0.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "keylime-tools-0:7.12.1-2.el10_0.5.x86_64",
"product": {
"name": "keylime-tools-0:7.12.1-2.el10_0.5.x86_64",
"product_id": "keylime-tools-0:7.12.1-2.el10_0.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-tools@7.12.1-2.el10_0.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "keylime-verifier-0:7.12.1-2.el10_0.5.x86_64",
"product": {
"name": "keylime-verifier-0:7.12.1-2.el10_0.5.x86_64",
"product_id": "keylime-verifier-0:7.12.1-2.el10_0.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-verifier@7.12.1-2.el10_0.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-keylime-0:7.12.1-2.el10_0.5.x86_64",
"product": {
"name": "python3-keylime-0:7.12.1-2.el10_0.5.x86_64",
"product_id": "python3-keylime-0:7.12.1-2.el10_0.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-keylime@7.12.1-2.el10_0.5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "keylime-0:7.12.1-2.el10_0.5.s390x",
"product": {
"name": "keylime-0:7.12.1-2.el10_0.5.s390x",
"product_id": "keylime-0:7.12.1-2.el10_0.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime@7.12.1-2.el10_0.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "keylime-base-0:7.12.1-2.el10_0.5.s390x",
"product": {
"name": "keylime-base-0:7.12.1-2.el10_0.5.s390x",
"product_id": "keylime-base-0:7.12.1-2.el10_0.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-base@7.12.1-2.el10_0.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "keylime-registrar-0:7.12.1-2.el10_0.5.s390x",
"product": {
"name": "keylime-registrar-0:7.12.1-2.el10_0.5.s390x",
"product_id": "keylime-registrar-0:7.12.1-2.el10_0.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-registrar@7.12.1-2.el10_0.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "keylime-tenant-0:7.12.1-2.el10_0.5.s390x",
"product": {
"name": "keylime-tenant-0:7.12.1-2.el10_0.5.s390x",
"product_id": "keylime-tenant-0:7.12.1-2.el10_0.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-tenant@7.12.1-2.el10_0.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "keylime-tools-0:7.12.1-2.el10_0.5.s390x",
"product": {
"name": "keylime-tools-0:7.12.1-2.el10_0.5.s390x",
"product_id": "keylime-tools-0:7.12.1-2.el10_0.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-tools@7.12.1-2.el10_0.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "keylime-verifier-0:7.12.1-2.el10_0.5.s390x",
"product": {
"name": "keylime-verifier-0:7.12.1-2.el10_0.5.s390x",
"product_id": "keylime-verifier-0:7.12.1-2.el10_0.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-verifier@7.12.1-2.el10_0.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-keylime-0:7.12.1-2.el10_0.5.s390x",
"product": {
"name": "python3-keylime-0:7.12.1-2.el10_0.5.s390x",
"product_id": "python3-keylime-0:7.12.1-2.el10_0.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-keylime@7.12.1-2.el10_0.5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "keylime-selinux-0:7.12.1-2.el10_0.5.noarch",
"product": {
"name": "keylime-selinux-0:7.12.1-2.el10_0.5.noarch",
"product_id": "keylime-selinux-0:7.12.1-2.el10_0.5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-selinux@7.12.1-2.el10_0.5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-0:7.12.1-2.el10_0.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:keylime-0:7.12.1-2.el10_0.5.aarch64"
},
"product_reference": "keylime-0:7.12.1-2.el10_0.5.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-0:7.12.1-2.el10_0.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:keylime-0:7.12.1-2.el10_0.5.ppc64le"
},
"product_reference": "keylime-0:7.12.1-2.el10_0.5.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-0:7.12.1-2.el10_0.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:keylime-0:7.12.1-2.el10_0.5.s390x"
},
"product_reference": "keylime-0:7.12.1-2.el10_0.5.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-0:7.12.1-2.el10_0.5.src as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:keylime-0:7.12.1-2.el10_0.5.src"
},
"product_reference": "keylime-0:7.12.1-2.el10_0.5.src",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-0:7.12.1-2.el10_0.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:keylime-0:7.12.1-2.el10_0.5.x86_64"
},
"product_reference": "keylime-0:7.12.1-2.el10_0.5.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-base-0:7.12.1-2.el10_0.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:keylime-base-0:7.12.1-2.el10_0.5.aarch64"
},
"product_reference": "keylime-base-0:7.12.1-2.el10_0.5.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-base-0:7.12.1-2.el10_0.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:keylime-base-0:7.12.1-2.el10_0.5.ppc64le"
},
"product_reference": "keylime-base-0:7.12.1-2.el10_0.5.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-base-0:7.12.1-2.el10_0.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:keylime-base-0:7.12.1-2.el10_0.5.s390x"
},
"product_reference": "keylime-base-0:7.12.1-2.el10_0.5.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-base-0:7.12.1-2.el10_0.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:keylime-base-0:7.12.1-2.el10_0.5.x86_64"
},
"product_reference": "keylime-base-0:7.12.1-2.el10_0.5.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-registrar-0:7.12.1-2.el10_0.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:keylime-registrar-0:7.12.1-2.el10_0.5.aarch64"
},
"product_reference": "keylime-registrar-0:7.12.1-2.el10_0.5.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-registrar-0:7.12.1-2.el10_0.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:keylime-registrar-0:7.12.1-2.el10_0.5.ppc64le"
},
"product_reference": "keylime-registrar-0:7.12.1-2.el10_0.5.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-registrar-0:7.12.1-2.el10_0.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:keylime-registrar-0:7.12.1-2.el10_0.5.s390x"
},
"product_reference": "keylime-registrar-0:7.12.1-2.el10_0.5.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-registrar-0:7.12.1-2.el10_0.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:keylime-registrar-0:7.12.1-2.el10_0.5.x86_64"
},
"product_reference": "keylime-registrar-0:7.12.1-2.el10_0.5.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-selinux-0:7.12.1-2.el10_0.5.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:keylime-selinux-0:7.12.1-2.el10_0.5.noarch"
},
"product_reference": "keylime-selinux-0:7.12.1-2.el10_0.5.noarch",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-tenant-0:7.12.1-2.el10_0.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:keylime-tenant-0:7.12.1-2.el10_0.5.aarch64"
},
"product_reference": "keylime-tenant-0:7.12.1-2.el10_0.5.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-tenant-0:7.12.1-2.el10_0.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:keylime-tenant-0:7.12.1-2.el10_0.5.ppc64le"
},
"product_reference": "keylime-tenant-0:7.12.1-2.el10_0.5.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-tenant-0:7.12.1-2.el10_0.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:keylime-tenant-0:7.12.1-2.el10_0.5.s390x"
},
"product_reference": "keylime-tenant-0:7.12.1-2.el10_0.5.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-tenant-0:7.12.1-2.el10_0.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:keylime-tenant-0:7.12.1-2.el10_0.5.x86_64"
},
"product_reference": "keylime-tenant-0:7.12.1-2.el10_0.5.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-tools-0:7.12.1-2.el10_0.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:keylime-tools-0:7.12.1-2.el10_0.5.aarch64"
},
"product_reference": "keylime-tools-0:7.12.1-2.el10_0.5.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-tools-0:7.12.1-2.el10_0.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:keylime-tools-0:7.12.1-2.el10_0.5.ppc64le"
},
"product_reference": "keylime-tools-0:7.12.1-2.el10_0.5.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-tools-0:7.12.1-2.el10_0.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:keylime-tools-0:7.12.1-2.el10_0.5.s390x"
},
"product_reference": "keylime-tools-0:7.12.1-2.el10_0.5.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-tools-0:7.12.1-2.el10_0.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:keylime-tools-0:7.12.1-2.el10_0.5.x86_64"
},
"product_reference": "keylime-tools-0:7.12.1-2.el10_0.5.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-verifier-0:7.12.1-2.el10_0.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:keylime-verifier-0:7.12.1-2.el10_0.5.aarch64"
},
"product_reference": "keylime-verifier-0:7.12.1-2.el10_0.5.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-verifier-0:7.12.1-2.el10_0.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:keylime-verifier-0:7.12.1-2.el10_0.5.ppc64le"
},
"product_reference": "keylime-verifier-0:7.12.1-2.el10_0.5.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-verifier-0:7.12.1-2.el10_0.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:keylime-verifier-0:7.12.1-2.el10_0.5.s390x"
},
"product_reference": "keylime-verifier-0:7.12.1-2.el10_0.5.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-verifier-0:7.12.1-2.el10_0.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:keylime-verifier-0:7.12.1-2.el10_0.5.x86_64"
},
"product_reference": "keylime-verifier-0:7.12.1-2.el10_0.5.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-keylime-0:7.12.1-2.el10_0.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:python3-keylime-0:7.12.1-2.el10_0.5.aarch64"
},
"product_reference": "python3-keylime-0:7.12.1-2.el10_0.5.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-keylime-0:7.12.1-2.el10_0.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:python3-keylime-0:7.12.1-2.el10_0.5.ppc64le"
},
"product_reference": "python3-keylime-0:7.12.1-2.el10_0.5.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-keylime-0:7.12.1-2.el10_0.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:python3-keylime-0:7.12.1-2.el10_0.5.s390x"
},
"product_reference": "python3-keylime-0:7.12.1-2.el10_0.5.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-keylime-0:7.12.1-2.el10_0.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:python3-keylime-0:7.12.1-2.el10_0.5.x86_64"
},
"product_reference": "python3-keylime-0:7.12.1-2.el10_0.5.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-1709",
"cwe": {
"id": "CWE-322",
"name": "Key Exchange without Entity Authentication"
},
"discovery_date": "2026-01-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2435514"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Keylime. The Keylime registrar, since version 7.12.0, does not enforce client-side Transport Layer Security (TLS) authentication. This authentication bypass vulnerability allows unauthenticated clients with network access to perform administrative operations, including listing agents, retrieving public Trusted Platform Module (TPM) data, and deleting agents, by connecting without presenting a client certificate.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "keylime: Keylime: Authentication bypass allows unauthorized administrative operations due to missing client-side TLS authentication",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a Critical authentication bypass flaw in the Keylime registrar, affecting versions 7.12.0 and later. The registrar fails to enforce client-side TLS authentication, enabling unauthenticated clients with network access to perform administrative actions such as listing or deleting agents and retrieving TPM data. Exploitation requires direct network access to the registrar\u0027s HTTPS port (default 8891). Keylime packages shipped in RHEL-9.6 and earlier are not affected, as they never shipped the version which introduced this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z.E2S:keylime-0:7.12.1-2.el10_0.5.aarch64",
"AppStream-10.0.Z.E2S:keylime-0:7.12.1-2.el10_0.5.ppc64le",
"AppStream-10.0.Z.E2S:keylime-0:7.12.1-2.el10_0.5.s390x",
"AppStream-10.0.Z.E2S:keylime-0:7.12.1-2.el10_0.5.src",
"AppStream-10.0.Z.E2S:keylime-0:7.12.1-2.el10_0.5.x86_64",
"AppStream-10.0.Z.E2S:keylime-base-0:7.12.1-2.el10_0.5.aarch64",
"AppStream-10.0.Z.E2S:keylime-base-0:7.12.1-2.el10_0.5.ppc64le",
"AppStream-10.0.Z.E2S:keylime-base-0:7.12.1-2.el10_0.5.s390x",
"AppStream-10.0.Z.E2S:keylime-base-0:7.12.1-2.el10_0.5.x86_64",
"AppStream-10.0.Z.E2S:keylime-registrar-0:7.12.1-2.el10_0.5.aarch64",
"AppStream-10.0.Z.E2S:keylime-registrar-0:7.12.1-2.el10_0.5.ppc64le",
"AppStream-10.0.Z.E2S:keylime-registrar-0:7.12.1-2.el10_0.5.s390x",
"AppStream-10.0.Z.E2S:keylime-registrar-0:7.12.1-2.el10_0.5.x86_64",
"AppStream-10.0.Z.E2S:keylime-selinux-0:7.12.1-2.el10_0.5.noarch",
"AppStream-10.0.Z.E2S:keylime-tenant-0:7.12.1-2.el10_0.5.aarch64",
"AppStream-10.0.Z.E2S:keylime-tenant-0:7.12.1-2.el10_0.5.ppc64le",
"AppStream-10.0.Z.E2S:keylime-tenant-0:7.12.1-2.el10_0.5.s390x",
"AppStream-10.0.Z.E2S:keylime-tenant-0:7.12.1-2.el10_0.5.x86_64",
"AppStream-10.0.Z.E2S:keylime-tools-0:7.12.1-2.el10_0.5.aarch64",
"AppStream-10.0.Z.E2S:keylime-tools-0:7.12.1-2.el10_0.5.ppc64le",
"AppStream-10.0.Z.E2S:keylime-tools-0:7.12.1-2.el10_0.5.s390x",
"AppStream-10.0.Z.E2S:keylime-tools-0:7.12.1-2.el10_0.5.x86_64",
"AppStream-10.0.Z.E2S:keylime-verifier-0:7.12.1-2.el10_0.5.aarch64",
"AppStream-10.0.Z.E2S:keylime-verifier-0:7.12.1-2.el10_0.5.ppc64le",
"AppStream-10.0.Z.E2S:keylime-verifier-0:7.12.1-2.el10_0.5.s390x",
"AppStream-10.0.Z.E2S:keylime-verifier-0:7.12.1-2.el10_0.5.x86_64",
"AppStream-10.0.Z.E2S:python3-keylime-0:7.12.1-2.el10_0.5.aarch64",
"AppStream-10.0.Z.E2S:python3-keylime-0:7.12.1-2.el10_0.5.ppc64le",
"AppStream-10.0.Z.E2S:python3-keylime-0:7.12.1-2.el10_0.5.s390x",
"AppStream-10.0.Z.E2S:python3-keylime-0:7.12.1-2.el10_0.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1709"
},
{
"category": "external",
"summary": "RHBZ#2435514",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2435514"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1709",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1709"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1709",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1709"
}
],
"release_date": "2026-02-06T17:45:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-09T09:44:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z.E2S:keylime-0:7.12.1-2.el10_0.5.aarch64",
"AppStream-10.0.Z.E2S:keylime-0:7.12.1-2.el10_0.5.ppc64le",
"AppStream-10.0.Z.E2S:keylime-0:7.12.1-2.el10_0.5.s390x",
"AppStream-10.0.Z.E2S:keylime-0:7.12.1-2.el10_0.5.src",
"AppStream-10.0.Z.E2S:keylime-0:7.12.1-2.el10_0.5.x86_64",
"AppStream-10.0.Z.E2S:keylime-base-0:7.12.1-2.el10_0.5.aarch64",
"AppStream-10.0.Z.E2S:keylime-base-0:7.12.1-2.el10_0.5.ppc64le",
"AppStream-10.0.Z.E2S:keylime-base-0:7.12.1-2.el10_0.5.s390x",
"AppStream-10.0.Z.E2S:keylime-base-0:7.12.1-2.el10_0.5.x86_64",
"AppStream-10.0.Z.E2S:keylime-registrar-0:7.12.1-2.el10_0.5.aarch64",
"AppStream-10.0.Z.E2S:keylime-registrar-0:7.12.1-2.el10_0.5.ppc64le",
"AppStream-10.0.Z.E2S:keylime-registrar-0:7.12.1-2.el10_0.5.s390x",
"AppStream-10.0.Z.E2S:keylime-registrar-0:7.12.1-2.el10_0.5.x86_64",
"AppStream-10.0.Z.E2S:keylime-selinux-0:7.12.1-2.el10_0.5.noarch",
"AppStream-10.0.Z.E2S:keylime-tenant-0:7.12.1-2.el10_0.5.aarch64",
"AppStream-10.0.Z.E2S:keylime-tenant-0:7.12.1-2.el10_0.5.ppc64le",
"AppStream-10.0.Z.E2S:keylime-tenant-0:7.12.1-2.el10_0.5.s390x",
"AppStream-10.0.Z.E2S:keylime-tenant-0:7.12.1-2.el10_0.5.x86_64",
"AppStream-10.0.Z.E2S:keylime-tools-0:7.12.1-2.el10_0.5.aarch64",
"AppStream-10.0.Z.E2S:keylime-tools-0:7.12.1-2.el10_0.5.ppc64le",
"AppStream-10.0.Z.E2S:keylime-tools-0:7.12.1-2.el10_0.5.s390x",
"AppStream-10.0.Z.E2S:keylime-tools-0:7.12.1-2.el10_0.5.x86_64",
"AppStream-10.0.Z.E2S:keylime-verifier-0:7.12.1-2.el10_0.5.aarch64",
"AppStream-10.0.Z.E2S:keylime-verifier-0:7.12.1-2.el10_0.5.ppc64le",
"AppStream-10.0.Z.E2S:keylime-verifier-0:7.12.1-2.el10_0.5.s390x",
"AppStream-10.0.Z.E2S:keylime-verifier-0:7.12.1-2.el10_0.5.x86_64",
"AppStream-10.0.Z.E2S:python3-keylime-0:7.12.1-2.el10_0.5.aarch64",
"AppStream-10.0.Z.E2S:python3-keylime-0:7.12.1-2.el10_0.5.ppc64le",
"AppStream-10.0.Z.E2S:python3-keylime-0:7.12.1-2.el10_0.5.s390x",
"AppStream-10.0.Z.E2S:python3-keylime-0:7.12.1-2.el10_0.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2298"
},
{
"category": "workaround",
"details": "Restrict network access to the Keylime registrar\u0027s HTTPS port (default 8891) to only trusted verifier and tenant hosts using firewall rules. \nAlternatively, deploy a reverse proxy (e.g., Nginx, HAProxy) in front of the registrar to enforce client certificate authentication. \nEnsure any changes to firewall rules or proxy configurations are reloaded or services are restarted for the mitigation to take effect.",
"product_ids": [
"AppStream-10.0.Z.E2S:keylime-0:7.12.1-2.el10_0.5.aarch64",
"AppStream-10.0.Z.E2S:keylime-0:7.12.1-2.el10_0.5.ppc64le",
"AppStream-10.0.Z.E2S:keylime-0:7.12.1-2.el10_0.5.s390x",
"AppStream-10.0.Z.E2S:keylime-0:7.12.1-2.el10_0.5.src",
"AppStream-10.0.Z.E2S:keylime-0:7.12.1-2.el10_0.5.x86_64",
"AppStream-10.0.Z.E2S:keylime-base-0:7.12.1-2.el10_0.5.aarch64",
"AppStream-10.0.Z.E2S:keylime-base-0:7.12.1-2.el10_0.5.ppc64le",
"AppStream-10.0.Z.E2S:keylime-base-0:7.12.1-2.el10_0.5.s390x",
"AppStream-10.0.Z.E2S:keylime-base-0:7.12.1-2.el10_0.5.x86_64",
"AppStream-10.0.Z.E2S:keylime-registrar-0:7.12.1-2.el10_0.5.aarch64",
"AppStream-10.0.Z.E2S:keylime-registrar-0:7.12.1-2.el10_0.5.ppc64le",
"AppStream-10.0.Z.E2S:keylime-registrar-0:7.12.1-2.el10_0.5.s390x",
"AppStream-10.0.Z.E2S:keylime-registrar-0:7.12.1-2.el10_0.5.x86_64",
"AppStream-10.0.Z.E2S:keylime-selinux-0:7.12.1-2.el10_0.5.noarch",
"AppStream-10.0.Z.E2S:keylime-tenant-0:7.12.1-2.el10_0.5.aarch64",
"AppStream-10.0.Z.E2S:keylime-tenant-0:7.12.1-2.el10_0.5.ppc64le",
"AppStream-10.0.Z.E2S:keylime-tenant-0:7.12.1-2.el10_0.5.s390x",
"AppStream-10.0.Z.E2S:keylime-tenant-0:7.12.1-2.el10_0.5.x86_64",
"AppStream-10.0.Z.E2S:keylime-tools-0:7.12.1-2.el10_0.5.aarch64",
"AppStream-10.0.Z.E2S:keylime-tools-0:7.12.1-2.el10_0.5.ppc64le",
"AppStream-10.0.Z.E2S:keylime-tools-0:7.12.1-2.el10_0.5.s390x",
"AppStream-10.0.Z.E2S:keylime-tools-0:7.12.1-2.el10_0.5.x86_64",
"AppStream-10.0.Z.E2S:keylime-verifier-0:7.12.1-2.el10_0.5.aarch64",
"AppStream-10.0.Z.E2S:keylime-verifier-0:7.12.1-2.el10_0.5.ppc64le",
"AppStream-10.0.Z.E2S:keylime-verifier-0:7.12.1-2.el10_0.5.s390x",
"AppStream-10.0.Z.E2S:keylime-verifier-0:7.12.1-2.el10_0.5.x86_64",
"AppStream-10.0.Z.E2S:python3-keylime-0:7.12.1-2.el10_0.5.aarch64",
"AppStream-10.0.Z.E2S:python3-keylime-0:7.12.1-2.el10_0.5.ppc64le",
"AppStream-10.0.Z.E2S:python3-keylime-0:7.12.1-2.el10_0.5.s390x",
"AppStream-10.0.Z.E2S:python3-keylime-0:7.12.1-2.el10_0.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z.E2S:keylime-0:7.12.1-2.el10_0.5.aarch64",
"AppStream-10.0.Z.E2S:keylime-0:7.12.1-2.el10_0.5.ppc64le",
"AppStream-10.0.Z.E2S:keylime-0:7.12.1-2.el10_0.5.s390x",
"AppStream-10.0.Z.E2S:keylime-0:7.12.1-2.el10_0.5.src",
"AppStream-10.0.Z.E2S:keylime-0:7.12.1-2.el10_0.5.x86_64",
"AppStream-10.0.Z.E2S:keylime-base-0:7.12.1-2.el10_0.5.aarch64",
"AppStream-10.0.Z.E2S:keylime-base-0:7.12.1-2.el10_0.5.ppc64le",
"AppStream-10.0.Z.E2S:keylime-base-0:7.12.1-2.el10_0.5.s390x",
"AppStream-10.0.Z.E2S:keylime-base-0:7.12.1-2.el10_0.5.x86_64",
"AppStream-10.0.Z.E2S:keylime-registrar-0:7.12.1-2.el10_0.5.aarch64",
"AppStream-10.0.Z.E2S:keylime-registrar-0:7.12.1-2.el10_0.5.ppc64le",
"AppStream-10.0.Z.E2S:keylime-registrar-0:7.12.1-2.el10_0.5.s390x",
"AppStream-10.0.Z.E2S:keylime-registrar-0:7.12.1-2.el10_0.5.x86_64",
"AppStream-10.0.Z.E2S:keylime-selinux-0:7.12.1-2.el10_0.5.noarch",
"AppStream-10.0.Z.E2S:keylime-tenant-0:7.12.1-2.el10_0.5.aarch64",
"AppStream-10.0.Z.E2S:keylime-tenant-0:7.12.1-2.el10_0.5.ppc64le",
"AppStream-10.0.Z.E2S:keylime-tenant-0:7.12.1-2.el10_0.5.s390x",
"AppStream-10.0.Z.E2S:keylime-tenant-0:7.12.1-2.el10_0.5.x86_64",
"AppStream-10.0.Z.E2S:keylime-tools-0:7.12.1-2.el10_0.5.aarch64",
"AppStream-10.0.Z.E2S:keylime-tools-0:7.12.1-2.el10_0.5.ppc64le",
"AppStream-10.0.Z.E2S:keylime-tools-0:7.12.1-2.el10_0.5.s390x",
"AppStream-10.0.Z.E2S:keylime-tools-0:7.12.1-2.el10_0.5.x86_64",
"AppStream-10.0.Z.E2S:keylime-verifier-0:7.12.1-2.el10_0.5.aarch64",
"AppStream-10.0.Z.E2S:keylime-verifier-0:7.12.1-2.el10_0.5.ppc64le",
"AppStream-10.0.Z.E2S:keylime-verifier-0:7.12.1-2.el10_0.5.s390x",
"AppStream-10.0.Z.E2S:keylime-verifier-0:7.12.1-2.el10_0.5.x86_64",
"AppStream-10.0.Z.E2S:python3-keylime-0:7.12.1-2.el10_0.5.aarch64",
"AppStream-10.0.Z.E2S:python3-keylime-0:7.12.1-2.el10_0.5.ppc64le",
"AppStream-10.0.Z.E2S:python3-keylime-0:7.12.1-2.el10_0.5.s390x",
"AppStream-10.0.Z.E2S:python3-keylime-0:7.12.1-2.el10_0.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "keylime: Keylime: Authentication bypass allows unauthorized administrative operations due to missing client-side TLS authentication"
}
]
}
RHSA-2026:2225
Vulnerability from csaf_redhat - Published: 2026-02-09 01:32 - Updated: 2026-02-09 15:28Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for keylime is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Keylime is a TPM based highly scalable remote boot attestation and runtime integrity measurement solution.\n\nSecurity Fix(es):\n\n* keylime: Keylime: Authentication bypass allows unauthorized administrative operations due to missing client-side TLS authentication (CVE-2026-1709)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2225",
"url": "https://access.redhat.com/errata/RHSA-2026:2225"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "2435514",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2435514"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2225.json"
}
],
"title": "Red Hat Security Advisory: keylime security update",
"tracking": {
"current_release_date": "2026-02-09T15:28:53+00:00",
"generator": {
"date": "2026-02-09T15:28:53+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2225",
"initial_release_date": "2026-02-09T01:32:21+00:00",
"revision_history": [
{
"date": "2026-02-09T01:32:21+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-09T01:32:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-09T15:28:53+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "keylime-0:7.12.1-11.el10_1.4.src",
"product": {
"name": "keylime-0:7.12.1-11.el10_1.4.src",
"product_id": "keylime-0:7.12.1-11.el10_1.4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime@7.12.1-11.el10_1.4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "keylime-0:7.12.1-11.el10_1.4.aarch64",
"product": {
"name": "keylime-0:7.12.1-11.el10_1.4.aarch64",
"product_id": "keylime-0:7.12.1-11.el10_1.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime@7.12.1-11.el10_1.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "keylime-base-0:7.12.1-11.el10_1.4.aarch64",
"product": {
"name": "keylime-base-0:7.12.1-11.el10_1.4.aarch64",
"product_id": "keylime-base-0:7.12.1-11.el10_1.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-base@7.12.1-11.el10_1.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "keylime-registrar-0:7.12.1-11.el10_1.4.aarch64",
"product": {
"name": "keylime-registrar-0:7.12.1-11.el10_1.4.aarch64",
"product_id": "keylime-registrar-0:7.12.1-11.el10_1.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-registrar@7.12.1-11.el10_1.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "keylime-tenant-0:7.12.1-11.el10_1.4.aarch64",
"product": {
"name": "keylime-tenant-0:7.12.1-11.el10_1.4.aarch64",
"product_id": "keylime-tenant-0:7.12.1-11.el10_1.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-tenant@7.12.1-11.el10_1.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "keylime-tools-0:7.12.1-11.el10_1.4.aarch64",
"product": {
"name": "keylime-tools-0:7.12.1-11.el10_1.4.aarch64",
"product_id": "keylime-tools-0:7.12.1-11.el10_1.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-tools@7.12.1-11.el10_1.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "keylime-verifier-0:7.12.1-11.el10_1.4.aarch64",
"product": {
"name": "keylime-verifier-0:7.12.1-11.el10_1.4.aarch64",
"product_id": "keylime-verifier-0:7.12.1-11.el10_1.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-verifier@7.12.1-11.el10_1.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-keylime-0:7.12.1-11.el10_1.4.aarch64",
"product": {
"name": "python3-keylime-0:7.12.1-11.el10_1.4.aarch64",
"product_id": "python3-keylime-0:7.12.1-11.el10_1.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-keylime@7.12.1-11.el10_1.4?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "keylime-0:7.12.1-11.el10_1.4.ppc64le",
"product": {
"name": "keylime-0:7.12.1-11.el10_1.4.ppc64le",
"product_id": "keylime-0:7.12.1-11.el10_1.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime@7.12.1-11.el10_1.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "keylime-base-0:7.12.1-11.el10_1.4.ppc64le",
"product": {
"name": "keylime-base-0:7.12.1-11.el10_1.4.ppc64le",
"product_id": "keylime-base-0:7.12.1-11.el10_1.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-base@7.12.1-11.el10_1.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "keylime-registrar-0:7.12.1-11.el10_1.4.ppc64le",
"product": {
"name": "keylime-registrar-0:7.12.1-11.el10_1.4.ppc64le",
"product_id": "keylime-registrar-0:7.12.1-11.el10_1.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-registrar@7.12.1-11.el10_1.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "keylime-tenant-0:7.12.1-11.el10_1.4.ppc64le",
"product": {
"name": "keylime-tenant-0:7.12.1-11.el10_1.4.ppc64le",
"product_id": "keylime-tenant-0:7.12.1-11.el10_1.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-tenant@7.12.1-11.el10_1.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "keylime-tools-0:7.12.1-11.el10_1.4.ppc64le",
"product": {
"name": "keylime-tools-0:7.12.1-11.el10_1.4.ppc64le",
"product_id": "keylime-tools-0:7.12.1-11.el10_1.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-tools@7.12.1-11.el10_1.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "keylime-verifier-0:7.12.1-11.el10_1.4.ppc64le",
"product": {
"name": "keylime-verifier-0:7.12.1-11.el10_1.4.ppc64le",
"product_id": "keylime-verifier-0:7.12.1-11.el10_1.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-verifier@7.12.1-11.el10_1.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-keylime-0:7.12.1-11.el10_1.4.ppc64le",
"product": {
"name": "python3-keylime-0:7.12.1-11.el10_1.4.ppc64le",
"product_id": "python3-keylime-0:7.12.1-11.el10_1.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-keylime@7.12.1-11.el10_1.4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "keylime-0:7.12.1-11.el10_1.4.x86_64",
"product": {
"name": "keylime-0:7.12.1-11.el10_1.4.x86_64",
"product_id": "keylime-0:7.12.1-11.el10_1.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime@7.12.1-11.el10_1.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "keylime-base-0:7.12.1-11.el10_1.4.x86_64",
"product": {
"name": "keylime-base-0:7.12.1-11.el10_1.4.x86_64",
"product_id": "keylime-base-0:7.12.1-11.el10_1.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-base@7.12.1-11.el10_1.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "keylime-registrar-0:7.12.1-11.el10_1.4.x86_64",
"product": {
"name": "keylime-registrar-0:7.12.1-11.el10_1.4.x86_64",
"product_id": "keylime-registrar-0:7.12.1-11.el10_1.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-registrar@7.12.1-11.el10_1.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "keylime-tenant-0:7.12.1-11.el10_1.4.x86_64",
"product": {
"name": "keylime-tenant-0:7.12.1-11.el10_1.4.x86_64",
"product_id": "keylime-tenant-0:7.12.1-11.el10_1.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-tenant@7.12.1-11.el10_1.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "keylime-tools-0:7.12.1-11.el10_1.4.x86_64",
"product": {
"name": "keylime-tools-0:7.12.1-11.el10_1.4.x86_64",
"product_id": "keylime-tools-0:7.12.1-11.el10_1.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-tools@7.12.1-11.el10_1.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "keylime-verifier-0:7.12.1-11.el10_1.4.x86_64",
"product": {
"name": "keylime-verifier-0:7.12.1-11.el10_1.4.x86_64",
"product_id": "keylime-verifier-0:7.12.1-11.el10_1.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-verifier@7.12.1-11.el10_1.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-keylime-0:7.12.1-11.el10_1.4.x86_64",
"product": {
"name": "python3-keylime-0:7.12.1-11.el10_1.4.x86_64",
"product_id": "python3-keylime-0:7.12.1-11.el10_1.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-keylime@7.12.1-11.el10_1.4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "keylime-0:7.12.1-11.el10_1.4.s390x",
"product": {
"name": "keylime-0:7.12.1-11.el10_1.4.s390x",
"product_id": "keylime-0:7.12.1-11.el10_1.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime@7.12.1-11.el10_1.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "keylime-base-0:7.12.1-11.el10_1.4.s390x",
"product": {
"name": "keylime-base-0:7.12.1-11.el10_1.4.s390x",
"product_id": "keylime-base-0:7.12.1-11.el10_1.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-base@7.12.1-11.el10_1.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "keylime-registrar-0:7.12.1-11.el10_1.4.s390x",
"product": {
"name": "keylime-registrar-0:7.12.1-11.el10_1.4.s390x",
"product_id": "keylime-registrar-0:7.12.1-11.el10_1.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-registrar@7.12.1-11.el10_1.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "keylime-tenant-0:7.12.1-11.el10_1.4.s390x",
"product": {
"name": "keylime-tenant-0:7.12.1-11.el10_1.4.s390x",
"product_id": "keylime-tenant-0:7.12.1-11.el10_1.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-tenant@7.12.1-11.el10_1.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "keylime-tools-0:7.12.1-11.el10_1.4.s390x",
"product": {
"name": "keylime-tools-0:7.12.1-11.el10_1.4.s390x",
"product_id": "keylime-tools-0:7.12.1-11.el10_1.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-tools@7.12.1-11.el10_1.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "keylime-verifier-0:7.12.1-11.el10_1.4.s390x",
"product": {
"name": "keylime-verifier-0:7.12.1-11.el10_1.4.s390x",
"product_id": "keylime-verifier-0:7.12.1-11.el10_1.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-verifier@7.12.1-11.el10_1.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-keylime-0:7.12.1-11.el10_1.4.s390x",
"product": {
"name": "python3-keylime-0:7.12.1-11.el10_1.4.s390x",
"product_id": "python3-keylime-0:7.12.1-11.el10_1.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-keylime@7.12.1-11.el10_1.4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "keylime-selinux-0:7.12.1-11.el10_1.4.noarch",
"product": {
"name": "keylime-selinux-0:7.12.1-11.el10_1.4.noarch",
"product_id": "keylime-selinux-0:7.12.1-11.el10_1.4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/keylime-selinux@7.12.1-11.el10_1.4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-0:7.12.1-11.el10_1.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:keylime-0:7.12.1-11.el10_1.4.aarch64"
},
"product_reference": "keylime-0:7.12.1-11.el10_1.4.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-0:7.12.1-11.el10_1.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:keylime-0:7.12.1-11.el10_1.4.ppc64le"
},
"product_reference": "keylime-0:7.12.1-11.el10_1.4.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-0:7.12.1-11.el10_1.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:keylime-0:7.12.1-11.el10_1.4.s390x"
},
"product_reference": "keylime-0:7.12.1-11.el10_1.4.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-0:7.12.1-11.el10_1.4.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:keylime-0:7.12.1-11.el10_1.4.src"
},
"product_reference": "keylime-0:7.12.1-11.el10_1.4.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-0:7.12.1-11.el10_1.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:keylime-0:7.12.1-11.el10_1.4.x86_64"
},
"product_reference": "keylime-0:7.12.1-11.el10_1.4.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-base-0:7.12.1-11.el10_1.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:keylime-base-0:7.12.1-11.el10_1.4.aarch64"
},
"product_reference": "keylime-base-0:7.12.1-11.el10_1.4.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-base-0:7.12.1-11.el10_1.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:keylime-base-0:7.12.1-11.el10_1.4.ppc64le"
},
"product_reference": "keylime-base-0:7.12.1-11.el10_1.4.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-base-0:7.12.1-11.el10_1.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:keylime-base-0:7.12.1-11.el10_1.4.s390x"
},
"product_reference": "keylime-base-0:7.12.1-11.el10_1.4.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-base-0:7.12.1-11.el10_1.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:keylime-base-0:7.12.1-11.el10_1.4.x86_64"
},
"product_reference": "keylime-base-0:7.12.1-11.el10_1.4.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-registrar-0:7.12.1-11.el10_1.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:keylime-registrar-0:7.12.1-11.el10_1.4.aarch64"
},
"product_reference": "keylime-registrar-0:7.12.1-11.el10_1.4.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-registrar-0:7.12.1-11.el10_1.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:keylime-registrar-0:7.12.1-11.el10_1.4.ppc64le"
},
"product_reference": "keylime-registrar-0:7.12.1-11.el10_1.4.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-registrar-0:7.12.1-11.el10_1.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:keylime-registrar-0:7.12.1-11.el10_1.4.s390x"
},
"product_reference": "keylime-registrar-0:7.12.1-11.el10_1.4.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-registrar-0:7.12.1-11.el10_1.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:keylime-registrar-0:7.12.1-11.el10_1.4.x86_64"
},
"product_reference": "keylime-registrar-0:7.12.1-11.el10_1.4.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-selinux-0:7.12.1-11.el10_1.4.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:keylime-selinux-0:7.12.1-11.el10_1.4.noarch"
},
"product_reference": "keylime-selinux-0:7.12.1-11.el10_1.4.noarch",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-tenant-0:7.12.1-11.el10_1.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:keylime-tenant-0:7.12.1-11.el10_1.4.aarch64"
},
"product_reference": "keylime-tenant-0:7.12.1-11.el10_1.4.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-tenant-0:7.12.1-11.el10_1.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:keylime-tenant-0:7.12.1-11.el10_1.4.ppc64le"
},
"product_reference": "keylime-tenant-0:7.12.1-11.el10_1.4.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-tenant-0:7.12.1-11.el10_1.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:keylime-tenant-0:7.12.1-11.el10_1.4.s390x"
},
"product_reference": "keylime-tenant-0:7.12.1-11.el10_1.4.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-tenant-0:7.12.1-11.el10_1.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:keylime-tenant-0:7.12.1-11.el10_1.4.x86_64"
},
"product_reference": "keylime-tenant-0:7.12.1-11.el10_1.4.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-tools-0:7.12.1-11.el10_1.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:keylime-tools-0:7.12.1-11.el10_1.4.aarch64"
},
"product_reference": "keylime-tools-0:7.12.1-11.el10_1.4.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-tools-0:7.12.1-11.el10_1.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:keylime-tools-0:7.12.1-11.el10_1.4.ppc64le"
},
"product_reference": "keylime-tools-0:7.12.1-11.el10_1.4.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-tools-0:7.12.1-11.el10_1.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:keylime-tools-0:7.12.1-11.el10_1.4.s390x"
},
"product_reference": "keylime-tools-0:7.12.1-11.el10_1.4.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-tools-0:7.12.1-11.el10_1.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:keylime-tools-0:7.12.1-11.el10_1.4.x86_64"
},
"product_reference": "keylime-tools-0:7.12.1-11.el10_1.4.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-verifier-0:7.12.1-11.el10_1.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:keylime-verifier-0:7.12.1-11.el10_1.4.aarch64"
},
"product_reference": "keylime-verifier-0:7.12.1-11.el10_1.4.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-verifier-0:7.12.1-11.el10_1.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:keylime-verifier-0:7.12.1-11.el10_1.4.ppc64le"
},
"product_reference": "keylime-verifier-0:7.12.1-11.el10_1.4.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-verifier-0:7.12.1-11.el10_1.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:keylime-verifier-0:7.12.1-11.el10_1.4.s390x"
},
"product_reference": "keylime-verifier-0:7.12.1-11.el10_1.4.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-verifier-0:7.12.1-11.el10_1.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:keylime-verifier-0:7.12.1-11.el10_1.4.x86_64"
},
"product_reference": "keylime-verifier-0:7.12.1-11.el10_1.4.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-keylime-0:7.12.1-11.el10_1.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:python3-keylime-0:7.12.1-11.el10_1.4.aarch64"
},
"product_reference": "python3-keylime-0:7.12.1-11.el10_1.4.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-keylime-0:7.12.1-11.el10_1.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:python3-keylime-0:7.12.1-11.el10_1.4.ppc64le"
},
"product_reference": "python3-keylime-0:7.12.1-11.el10_1.4.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-keylime-0:7.12.1-11.el10_1.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:python3-keylime-0:7.12.1-11.el10_1.4.s390x"
},
"product_reference": "python3-keylime-0:7.12.1-11.el10_1.4.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-keylime-0:7.12.1-11.el10_1.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:python3-keylime-0:7.12.1-11.el10_1.4.x86_64"
},
"product_reference": "python3-keylime-0:7.12.1-11.el10_1.4.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-1709",
"cwe": {
"id": "CWE-322",
"name": "Key Exchange without Entity Authentication"
},
"discovery_date": "2026-01-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2435514"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Keylime. The Keylime registrar, since version 7.12.0, does not enforce client-side Transport Layer Security (TLS) authentication. This authentication bypass vulnerability allows unauthenticated clients with network access to perform administrative operations, including listing agents, retrieving public Trusted Platform Module (TPM) data, and deleting agents, by connecting without presenting a client certificate.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "keylime: Keylime: Authentication bypass allows unauthorized administrative operations due to missing client-side TLS authentication",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a Critical authentication bypass flaw in the Keylime registrar, affecting versions 7.12.0 and later. The registrar fails to enforce client-side TLS authentication, enabling unauthenticated clients with network access to perform administrative actions such as listing or deleting agents and retrieving TPM data. Exploitation requires direct network access to the registrar\u0027s HTTPS port (default 8891). Keylime packages shipped in RHEL-9.6 and earlier are not affected, as they never shipped the version which introduced this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:keylime-0:7.12.1-11.el10_1.4.aarch64",
"AppStream-10.1.Z:keylime-0:7.12.1-11.el10_1.4.ppc64le",
"AppStream-10.1.Z:keylime-0:7.12.1-11.el10_1.4.s390x",
"AppStream-10.1.Z:keylime-0:7.12.1-11.el10_1.4.src",
"AppStream-10.1.Z:keylime-0:7.12.1-11.el10_1.4.x86_64",
"AppStream-10.1.Z:keylime-base-0:7.12.1-11.el10_1.4.aarch64",
"AppStream-10.1.Z:keylime-base-0:7.12.1-11.el10_1.4.ppc64le",
"AppStream-10.1.Z:keylime-base-0:7.12.1-11.el10_1.4.s390x",
"AppStream-10.1.Z:keylime-base-0:7.12.1-11.el10_1.4.x86_64",
"AppStream-10.1.Z:keylime-registrar-0:7.12.1-11.el10_1.4.aarch64",
"AppStream-10.1.Z:keylime-registrar-0:7.12.1-11.el10_1.4.ppc64le",
"AppStream-10.1.Z:keylime-registrar-0:7.12.1-11.el10_1.4.s390x",
"AppStream-10.1.Z:keylime-registrar-0:7.12.1-11.el10_1.4.x86_64",
"AppStream-10.1.Z:keylime-selinux-0:7.12.1-11.el10_1.4.noarch",
"AppStream-10.1.Z:keylime-tenant-0:7.12.1-11.el10_1.4.aarch64",
"AppStream-10.1.Z:keylime-tenant-0:7.12.1-11.el10_1.4.ppc64le",
"AppStream-10.1.Z:keylime-tenant-0:7.12.1-11.el10_1.4.s390x",
"AppStream-10.1.Z:keylime-tenant-0:7.12.1-11.el10_1.4.x86_64",
"AppStream-10.1.Z:keylime-tools-0:7.12.1-11.el10_1.4.aarch64",
"AppStream-10.1.Z:keylime-tools-0:7.12.1-11.el10_1.4.ppc64le",
"AppStream-10.1.Z:keylime-tools-0:7.12.1-11.el10_1.4.s390x",
"AppStream-10.1.Z:keylime-tools-0:7.12.1-11.el10_1.4.x86_64",
"AppStream-10.1.Z:keylime-verifier-0:7.12.1-11.el10_1.4.aarch64",
"AppStream-10.1.Z:keylime-verifier-0:7.12.1-11.el10_1.4.ppc64le",
"AppStream-10.1.Z:keylime-verifier-0:7.12.1-11.el10_1.4.s390x",
"AppStream-10.1.Z:keylime-verifier-0:7.12.1-11.el10_1.4.x86_64",
"AppStream-10.1.Z:python3-keylime-0:7.12.1-11.el10_1.4.aarch64",
"AppStream-10.1.Z:python3-keylime-0:7.12.1-11.el10_1.4.ppc64le",
"AppStream-10.1.Z:python3-keylime-0:7.12.1-11.el10_1.4.s390x",
"AppStream-10.1.Z:python3-keylime-0:7.12.1-11.el10_1.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1709"
},
{
"category": "external",
"summary": "RHBZ#2435514",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2435514"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1709",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1709"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1709",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1709"
}
],
"release_date": "2026-02-06T17:45:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-09T01:32:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:keylime-0:7.12.1-11.el10_1.4.aarch64",
"AppStream-10.1.Z:keylime-0:7.12.1-11.el10_1.4.ppc64le",
"AppStream-10.1.Z:keylime-0:7.12.1-11.el10_1.4.s390x",
"AppStream-10.1.Z:keylime-0:7.12.1-11.el10_1.4.src",
"AppStream-10.1.Z:keylime-0:7.12.1-11.el10_1.4.x86_64",
"AppStream-10.1.Z:keylime-base-0:7.12.1-11.el10_1.4.aarch64",
"AppStream-10.1.Z:keylime-base-0:7.12.1-11.el10_1.4.ppc64le",
"AppStream-10.1.Z:keylime-base-0:7.12.1-11.el10_1.4.s390x",
"AppStream-10.1.Z:keylime-base-0:7.12.1-11.el10_1.4.x86_64",
"AppStream-10.1.Z:keylime-registrar-0:7.12.1-11.el10_1.4.aarch64",
"AppStream-10.1.Z:keylime-registrar-0:7.12.1-11.el10_1.4.ppc64le",
"AppStream-10.1.Z:keylime-registrar-0:7.12.1-11.el10_1.4.s390x",
"AppStream-10.1.Z:keylime-registrar-0:7.12.1-11.el10_1.4.x86_64",
"AppStream-10.1.Z:keylime-selinux-0:7.12.1-11.el10_1.4.noarch",
"AppStream-10.1.Z:keylime-tenant-0:7.12.1-11.el10_1.4.aarch64",
"AppStream-10.1.Z:keylime-tenant-0:7.12.1-11.el10_1.4.ppc64le",
"AppStream-10.1.Z:keylime-tenant-0:7.12.1-11.el10_1.4.s390x",
"AppStream-10.1.Z:keylime-tenant-0:7.12.1-11.el10_1.4.x86_64",
"AppStream-10.1.Z:keylime-tools-0:7.12.1-11.el10_1.4.aarch64",
"AppStream-10.1.Z:keylime-tools-0:7.12.1-11.el10_1.4.ppc64le",
"AppStream-10.1.Z:keylime-tools-0:7.12.1-11.el10_1.4.s390x",
"AppStream-10.1.Z:keylime-tools-0:7.12.1-11.el10_1.4.x86_64",
"AppStream-10.1.Z:keylime-verifier-0:7.12.1-11.el10_1.4.aarch64",
"AppStream-10.1.Z:keylime-verifier-0:7.12.1-11.el10_1.4.ppc64le",
"AppStream-10.1.Z:keylime-verifier-0:7.12.1-11.el10_1.4.s390x",
"AppStream-10.1.Z:keylime-verifier-0:7.12.1-11.el10_1.4.x86_64",
"AppStream-10.1.Z:python3-keylime-0:7.12.1-11.el10_1.4.aarch64",
"AppStream-10.1.Z:python3-keylime-0:7.12.1-11.el10_1.4.ppc64le",
"AppStream-10.1.Z:python3-keylime-0:7.12.1-11.el10_1.4.s390x",
"AppStream-10.1.Z:python3-keylime-0:7.12.1-11.el10_1.4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2225"
},
{
"category": "workaround",
"details": "Restrict network access to the Keylime registrar\u0027s HTTPS port (default 8891) to only trusted verifier and tenant hosts using firewall rules. \nAlternatively, deploy a reverse proxy (e.g., Nginx, HAProxy) in front of the registrar to enforce client certificate authentication. \nEnsure any changes to firewall rules or proxy configurations are reloaded or services are restarted for the mitigation to take effect.",
"product_ids": [
"AppStream-10.1.Z:keylime-0:7.12.1-11.el10_1.4.aarch64",
"AppStream-10.1.Z:keylime-0:7.12.1-11.el10_1.4.ppc64le",
"AppStream-10.1.Z:keylime-0:7.12.1-11.el10_1.4.s390x",
"AppStream-10.1.Z:keylime-0:7.12.1-11.el10_1.4.src",
"AppStream-10.1.Z:keylime-0:7.12.1-11.el10_1.4.x86_64",
"AppStream-10.1.Z:keylime-base-0:7.12.1-11.el10_1.4.aarch64",
"AppStream-10.1.Z:keylime-base-0:7.12.1-11.el10_1.4.ppc64le",
"AppStream-10.1.Z:keylime-base-0:7.12.1-11.el10_1.4.s390x",
"AppStream-10.1.Z:keylime-base-0:7.12.1-11.el10_1.4.x86_64",
"AppStream-10.1.Z:keylime-registrar-0:7.12.1-11.el10_1.4.aarch64",
"AppStream-10.1.Z:keylime-registrar-0:7.12.1-11.el10_1.4.ppc64le",
"AppStream-10.1.Z:keylime-registrar-0:7.12.1-11.el10_1.4.s390x",
"AppStream-10.1.Z:keylime-registrar-0:7.12.1-11.el10_1.4.x86_64",
"AppStream-10.1.Z:keylime-selinux-0:7.12.1-11.el10_1.4.noarch",
"AppStream-10.1.Z:keylime-tenant-0:7.12.1-11.el10_1.4.aarch64",
"AppStream-10.1.Z:keylime-tenant-0:7.12.1-11.el10_1.4.ppc64le",
"AppStream-10.1.Z:keylime-tenant-0:7.12.1-11.el10_1.4.s390x",
"AppStream-10.1.Z:keylime-tenant-0:7.12.1-11.el10_1.4.x86_64",
"AppStream-10.1.Z:keylime-tools-0:7.12.1-11.el10_1.4.aarch64",
"AppStream-10.1.Z:keylime-tools-0:7.12.1-11.el10_1.4.ppc64le",
"AppStream-10.1.Z:keylime-tools-0:7.12.1-11.el10_1.4.s390x",
"AppStream-10.1.Z:keylime-tools-0:7.12.1-11.el10_1.4.x86_64",
"AppStream-10.1.Z:keylime-verifier-0:7.12.1-11.el10_1.4.aarch64",
"AppStream-10.1.Z:keylime-verifier-0:7.12.1-11.el10_1.4.ppc64le",
"AppStream-10.1.Z:keylime-verifier-0:7.12.1-11.el10_1.4.s390x",
"AppStream-10.1.Z:keylime-verifier-0:7.12.1-11.el10_1.4.x86_64",
"AppStream-10.1.Z:python3-keylime-0:7.12.1-11.el10_1.4.aarch64",
"AppStream-10.1.Z:python3-keylime-0:7.12.1-11.el10_1.4.ppc64le",
"AppStream-10.1.Z:python3-keylime-0:7.12.1-11.el10_1.4.s390x",
"AppStream-10.1.Z:python3-keylime-0:7.12.1-11.el10_1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:keylime-0:7.12.1-11.el10_1.4.aarch64",
"AppStream-10.1.Z:keylime-0:7.12.1-11.el10_1.4.ppc64le",
"AppStream-10.1.Z:keylime-0:7.12.1-11.el10_1.4.s390x",
"AppStream-10.1.Z:keylime-0:7.12.1-11.el10_1.4.src",
"AppStream-10.1.Z:keylime-0:7.12.1-11.el10_1.4.x86_64",
"AppStream-10.1.Z:keylime-base-0:7.12.1-11.el10_1.4.aarch64",
"AppStream-10.1.Z:keylime-base-0:7.12.1-11.el10_1.4.ppc64le",
"AppStream-10.1.Z:keylime-base-0:7.12.1-11.el10_1.4.s390x",
"AppStream-10.1.Z:keylime-base-0:7.12.1-11.el10_1.4.x86_64",
"AppStream-10.1.Z:keylime-registrar-0:7.12.1-11.el10_1.4.aarch64",
"AppStream-10.1.Z:keylime-registrar-0:7.12.1-11.el10_1.4.ppc64le",
"AppStream-10.1.Z:keylime-registrar-0:7.12.1-11.el10_1.4.s390x",
"AppStream-10.1.Z:keylime-registrar-0:7.12.1-11.el10_1.4.x86_64",
"AppStream-10.1.Z:keylime-selinux-0:7.12.1-11.el10_1.4.noarch",
"AppStream-10.1.Z:keylime-tenant-0:7.12.1-11.el10_1.4.aarch64",
"AppStream-10.1.Z:keylime-tenant-0:7.12.1-11.el10_1.4.ppc64le",
"AppStream-10.1.Z:keylime-tenant-0:7.12.1-11.el10_1.4.s390x",
"AppStream-10.1.Z:keylime-tenant-0:7.12.1-11.el10_1.4.x86_64",
"AppStream-10.1.Z:keylime-tools-0:7.12.1-11.el10_1.4.aarch64",
"AppStream-10.1.Z:keylime-tools-0:7.12.1-11.el10_1.4.ppc64le",
"AppStream-10.1.Z:keylime-tools-0:7.12.1-11.el10_1.4.s390x",
"AppStream-10.1.Z:keylime-tools-0:7.12.1-11.el10_1.4.x86_64",
"AppStream-10.1.Z:keylime-verifier-0:7.12.1-11.el10_1.4.aarch64",
"AppStream-10.1.Z:keylime-verifier-0:7.12.1-11.el10_1.4.ppc64le",
"AppStream-10.1.Z:keylime-verifier-0:7.12.1-11.el10_1.4.s390x",
"AppStream-10.1.Z:keylime-verifier-0:7.12.1-11.el10_1.4.x86_64",
"AppStream-10.1.Z:python3-keylime-0:7.12.1-11.el10_1.4.aarch64",
"AppStream-10.1.Z:python3-keylime-0:7.12.1-11.el10_1.4.ppc64le",
"AppStream-10.1.Z:python3-keylime-0:7.12.1-11.el10_1.4.s390x",
"AppStream-10.1.Z:python3-keylime-0:7.12.1-11.el10_1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "keylime: Keylime: Authentication bypass allows unauthorized administrative operations due to missing client-side TLS authentication"
}
]
}
GHSA-27JC-JMP8-QFW5
Vulnerability from github – Published: 2026-02-06 21:30 – Updated: 2026-02-09 12:30Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-4jqp-9qjv-57m2. This link is maintained to preserve external references.
Original Description
A flaw was found in Keylime. The Keylime registrar, since version 7.12.0, does not enforce client-side Transport Layer Security (TLS) authentication. This authentication bypass vulnerability allows unauthenticated clients with network access to perform administrative operations, including listing agents, retrieving public Trusted Platform Module (TPM) data, and deleting agents, by connecting without presenting a client certificate.
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "keylime"
},
"ranges": [
{
"events": [
{
"introduced": "7.12.0"
},
{
"fixed": "7.12.2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "PyPI",
"name": "keylime"
},
"ranges": [
{
"events": [
{
"introduced": "7.13.0"
},
{
"fixed": "7.13.1"
}
],
"type": "ECOSYSTEM"
}
],
"versions": [
"7.13.0"
]
}
],
"aliases": [],
"database_specific": {
"cwe_ids": [
"CWE-322"
],
"github_reviewed": true,
"github_reviewed_at": "2026-02-06T22:33:06Z",
"nvd_published_at": "2026-02-06T20:16:09Z",
"severity": "CRITICAL"
},
"details": "### Duplicate Advisory\nThis advisory has been withdrawn because it is a duplicate of GHSA-4jqp-9qjv-57m2. This link is maintained to preserve external references.\n\n### Original Description\nA flaw was found in Keylime. The Keylime registrar, since version 7.12.0, does not enforce client-side Transport Layer Security (TLS) authentication. This authentication bypass vulnerability allows unauthenticated clients with network access to perform administrative operations, including listing agents, retrieving public Trusted Platform Module (TPM) data, and deleting agents, by connecting without presenting a client certificate.",
"id": "GHSA-27jc-jmp8-qfw5",
"modified": "2026-02-09T12:30:21Z",
"published": "2026-02-06T21:30:49Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1709"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:2224"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:2225"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:2298"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2026-1709"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2435514"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "Duplicate Advisory: Keylime Missing Authentication for Critical Function and Improper Authentication",
"withdrawn": "2026-02-06T22:33:06Z"
}
GHSA-4JQP-9QJV-57M2
Vulnerability from github – Published: 2026-02-06 22:34 – Updated: 2026-02-06 22:34Impact
The Keylime registrar does not enforce mutual TLS (mTLS) client certificate authentication since version 7.12.0. The registrar's TLS context is configured with ssl.CERT_OPTIONAL instead of ssl.CERT_REQUIRED, allowing any client to connect to protected API endpoints without presenting a valid client certificate.
Who is impacted: - All Keylime deployments running versions 7.12.0 through 7.13.0 - Environments where the registrar HTTPS port (default 8891) is network-accessible to untrusted clients
What an attacker can do:
- List all registered agents (GET /v2/agents/) - enumerate the entire agent inventory
- Retrieve agent details (GET /v2/agents/{uuid}) - obtain public TPM keys, certificates, and network locations (IP/port) of any agent
- Delete any agent (DELETE /v2/agents/{uuid}) - remove agents from the registry, disrupting attestation services
Note: The exposed TPM data (EK, AK, certificates) consists of public keys and certificates. Private keys remain protected within TPM hardware. The HMAC secret used for challenge-response validation is stored in the database but is not exposed via the API.
Affected versions: >= 7.12.0, <= 7.13.0
Fixed versions: 7.12.2, >= 7.13.1
Patches
A patch for the affected released versions is available. It removes the line that override the configuration of ssl.verify_mode, leaving the CERT_REQUIRED value set by web_util.init_mtls():
diff --git a/keylime/web/base/server.py b/keylime/web/base/server.py
index 1d9a9c2..859b23a 100644
--- a/keylime/web/base/server.py
+++ b/keylime/web/base/server.py
@@ -2,7 +2,6 @@ import asyncio
import multiprocessing
from abc import ABC, abstractmethod
from functools import wraps
-from ssl import CERT_OPTIONAL
from typing import TYPE_CHECKING, Any, Callable, Optional
import tornado
@@ -252,7 +251,6 @@ class Server(ABC):
self._https_port = config.getint(component, "tls_port", fallback=0)
self._max_upload_size = config.getint(component, "max_upload_size", fallback=104857600)
self._ssl_ctx = web_util.init_mtls(component)
- self._ssl_ctx.verify_mode = CERT_OPTIONAL
def _get(self, pattern: str, controller: type["Controller"], action: str, allow_insecure: bool = False) -> None:
"""Creates a new route to handle incoming GET requests issued for paths which match the given
Users should upgrade to the patched version once it is released.
Workarounds
If upgrading is not immediately possible, apply one of the following mitigations:
1. Network isolation (Recommended)
Restrict access to the registrar HTTPS port (default 8891) using firewall rules to allow only trusted hosts (verifier, tenant):
Example using iptables
iptables -A INPUT -p tcp --dport 8891 -s <verifier_ip> -j ACCEPT
iptables -A INPUT -p tcp --dport 8891 -s <tenant_ip> -j ACCEPT
iptables -A INPUT -p tcp --dport 8891 -j DROP
2. Reverse proxy with mTLS enforcement
Deploy a reverse proxy (nginx, HAProxy) in front of the registrar that enforces client certificate authentication:
Example nginx configuration
server {
listen 8891 ssl;
ssl_certificate /path/to/server.crt;
ssl_certificate_key /path/to/server.key;
ssl_client_certificate /path/to/ca.crt;
ssl_verify_client on; # Enforce client certificates
location / {
proxy_pass https://localhost:8892; # Internal registrar port
}
}
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "keylime"
},
"ranges": [
{
"events": [
{
"introduced": "7.12.0"
},
{
"fixed": "7.12.2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "PyPI",
"name": "keylime"
},
"ranges": [
{
"events": [
{
"introduced": "7.13.0"
},
{
"fixed": "7.13.1"
}
],
"type": "ECOSYSTEM"
}
],
"versions": [
"7.13.0"
]
}
],
"aliases": [
"CVE-2026-1709"
],
"database_specific": {
"cwe_ids": [
"CWE-295",
"CWE-306"
],
"github_reviewed": true,
"github_reviewed_at": "2026-02-06T22:34:44Z",
"nvd_published_at": null,
"severity": "CRITICAL"
},
"details": "### Impact\n\nThe Keylime registrar does not enforce mutual TLS (mTLS) client certificate authentication since version 7.12.0. The registrar\u0027s TLS context is configured with `ssl.CERT_OPTIONAL` instead of `ssl.CERT_REQUIRED`, allowing any client to connect to protected API endpoints without presenting a valid client certificate.\n\n**Who is impacted:**\n - All Keylime deployments running versions 7.12.0 through 7.13.0\n - Environments where the registrar HTTPS port (default 8891) is network-accessible to untrusted clients\n\n**What an attacker can do:**\n - **List all registered agents** (`GET /v2/agents/`) - enumerate the entire agent inventory\n - **Retrieve agent details** (`GET /v2/agents/{uuid}`) - obtain public TPM keys, certificates, and network locations (IP/port) of any agent\n - **Delete any agent** (`DELETE /v2/agents/{uuid}`) - remove agents from the registry, disrupting attestation services\n\nNote: The exposed TPM data (EK, AK, certificates) consists of public keys and certificates. Private keys remain protected within TPM hardware. The HMAC secret used for challenge-response validation is stored in the database but is not exposed via the API.\n\n**Affected versions:** \u003e= 7.12.0, \u003c= 7.13.0\n\n**Fixed versions:** 7.12.2, \u003e= 7.13.1\n\n### Patches\n\nA patch for the affected released versions is available. It removes the line that override the configuration of `ssl.verify_mode`, leaving the `CERT_REQUIRED` value set by `web_util.init_mtls()`:\n\n```diff\ndiff --git a/keylime/web/base/server.py b/keylime/web/base/server.py\nindex 1d9a9c2..859b23a 100644\n--- a/keylime/web/base/server.py\n+++ b/keylime/web/base/server.py\n@@ -2,7 +2,6 @@ import asyncio\n import multiprocessing\n from abc import ABC, abstractmethod\n from functools import wraps\n-from ssl import CERT_OPTIONAL\n from typing import TYPE_CHECKING, Any, Callable, Optional\n\n import tornado\n@@ -252,7 +251,6 @@ class Server(ABC):\n self._https_port = config.getint(component, \"tls_port\", fallback=0)\n self._max_upload_size = config.getint(component, \"max_upload_size\", fallback=104857600)\n self._ssl_ctx = web_util.init_mtls(component)\n- self._ssl_ctx.verify_mode = CERT_OPTIONAL\n\n def _get(self, pattern: str, controller: type[\"Controller\"], action: str, allow_insecure: bool = False) -\u003e None:\n \"\"\"Creates a new route to handle incoming GET requests issued for paths which match the given\n```\n\nUsers should upgrade to the patched version once it is released.\n\n### Workarounds\n\nIf upgrading is not immediately possible, apply one of the following mitigations:\n\n#### 1. Network isolation (Recommended)\n\nRestrict access to the registrar HTTPS port (default 8891) using firewall rules\nto allow only trusted hosts (verifier, tenant):\n\n##### Example using iptables\n```\niptables -A INPUT -p tcp --dport 8891 -s \u003cverifier_ip\u003e -j ACCEPT\niptables -A INPUT -p tcp --dport 8891 -s \u003ctenant_ip\u003e -j ACCEPT\niptables -A INPUT -p tcp --dport 8891 -j DROP\n```\n\n#### 2. Reverse proxy with mTLS enforcement\n\nDeploy a reverse proxy (nginx, HAProxy) in front of the registrar that enforces client certificate authentication:\n\n##### Example nginx configuration\n```\nserver {\n listen 8891 ssl;\n ssl_certificate /path/to/server.crt;\n ssl_certificate_key /path/to/server.key;\n ssl_client_certificate /path/to/ca.crt;\n ssl_verify_client on; # Enforce client certificates\n\n location / {\n proxy_pass https://localhost:8892; # Internal registrar port\n }\n}\n```",
"id": "GHSA-4jqp-9qjv-57m2",
"modified": "2026-02-06T22:34:44Z",
"published": "2026-02-06T22:34:44Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/keylime/keylime/security/advisories/GHSA-4jqp-9qjv-57m2"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1709"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2026-1709"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2435514"
},
{
"type": "PACKAGE",
"url": "https://github.com/keylime/keylime"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "Keylime Missing Authentication for Critical Function and Improper Authentication"
}
FKIE_CVE-2026-1709
Vulnerability from fkie_nvd - Published: 2026-02-06 20:16 - Updated: 2026-02-09 10:15| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in Keylime. The Keylime registrar, since version 7.12.0, does not enforce client-side Transport Layer Security (TLS) authentication. This authentication bypass vulnerability allows unauthenticated clients with network access to perform administrative operations, including listing agents, retrieving public Trusted Platform Module (TPM) data, and deleting agents, by connecting without presenting a client certificate."
}
],
"id": "CVE-2026-1709",
"lastModified": "2026-02-09T10:15:57.377",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.5,
"source": "secalert@redhat.com",
"type": "Secondary"
}
]
},
"published": "2026-02-06T20:16:09.193",
"references": [
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:2224"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:2225"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:2298"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/security/cve/CVE-2026-1709"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2435514"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-322"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.