A flaw was found in Keylime. The Keylime registrar, since version 7.12.0, does not enforce client-side Transport Layer Security (TLS) authentication. This authentication bypass vulnerability allows unauthenticated clients with network access to perform administrative operations, including listing agents, retrieving public Trusted Platform Module (TPM) data, and deleting agents, by connecting without presenting a client certificate.
History

Fri, 06 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Feb 2026 19:30:00 +0000

Type Values Removed Values Added
Description A flaw was found in Keylime. The Keylime registrar, since version 7.12.0, does not enforce client-side Transport Layer Security (TLS) authentication. This authentication bypass vulnerability allows unauthenticated clients with network access to perform administrative operations, including listing agents, retrieving public Trusted Platform Module (TPM) data, and deleting agents, by connecting without presenting a client certificate.
Title Keylime: keylime: authentication bypass allows unauthorized administrative operations due to missing client-side tls authentication
First Time appeared Redhat
Redhat enterprise Linux
Weaknesses CWE-322
CPEs cpe:/o:redhat:enterprise_linux:10
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux
References
Metrics cvssV3_1

{'score': 9.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-02-06T19:38:39.749Z

Reserved: 2026-01-30T17:00:54.761Z

Link: CVE-2026-1709

cve-icon Vulnrichment

Updated: 2026-02-06T19:38:25.955Z

cve-icon NVD

Status : Received

Published: 2026-02-06T20:16:09.193

Modified: 2026-02-06T20:16:09.193

Link: CVE-2026-1709

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.