Vulnerability Description
A vulnerability in Keylime before 6.3.0 allows an attacker to craft a request to the agent that resets the U and V keys as if the agent were being re-added to a verifier. This could lead to a remote code execution.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Keylime | Keylime | < 6.3.0 |
Related Weaknesses (CWE)
References
- https://github.com/keylime/keylime/security/advisories/GHSA-2m39-75g9-ff5rMitigationThird Party Advisory
- https://seclists.org/oss-sec/2022/q1/101ExploitMailing ListPatch
- https://github.com/keylime/keylime/security/advisories/GHSA-2m39-75g9-ff5rMitigationThird Party Advisory
- https://seclists.org/oss-sec/2022/q1/101ExploitMailing ListPatch
FAQ
What is CVE-2021-43310?
CVE-2021-43310 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A vulnerability in Keylime before 6.3.0 allows an attacker to craft a request to the agent that resets the U and V keys as if the agent were being re-added to a verifier. This could lead to a remote c...
How severe is CVE-2021-43310?
CVE-2021-43310 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2021-43310?
Check the references section above for vendor advisories and patch information. Affected products include: Keylime Keylime.