A flaw was found in Keylime. The Keylime registrar, since version 7.12.0, does not enforce client-side Transport Layer Security (TLS) authentication. This authentication bypass vulnerability allows unauthenticated clients with network access to perform administrative operations, including listing agents, retrieving public Trusted Platform Module (TPM) data, and deleting agents, by connecting without presenting a client certificate.
Metrics
Affected Vendors & Products
References
History
Fri, 06 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 06 Feb 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in Keylime. The Keylime registrar, since version 7.12.0, does not enforce client-side Transport Layer Security (TLS) authentication. This authentication bypass vulnerability allows unauthenticated clients with network access to perform administrative operations, including listing agents, retrieving public Trusted Platform Module (TPM) data, and deleting agents, by connecting without presenting a client certificate. | |
| Title | Keylime: keylime: authentication bypass allows unauthorized administrative operations due to missing client-side tls authentication | |
| First Time appeared |
Redhat
Redhat enterprise Linux |
|
| Weaknesses | CWE-322 | |
| CPEs | cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:9 |
|
| Vendors & Products |
Redhat
Redhat enterprise Linux |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-02-06T19:38:39.749Z
Reserved: 2026-01-30T17:00:54.761Z
Link: CVE-2026-1709
Updated: 2026-02-06T19:38:25.955Z
Status : Received
Published: 2026-02-06T20:16:09.193
Modified: 2026-02-06T20:16:09.193
Link: CVE-2026-1709
No data.
OpenCVE Enrichment
No data.