CVE-2023-38201

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-38201
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-38201.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-38201
Aliases
Related
Published
2023-08-25T17:15:08Z
Modified
2024-10-12T11:00:40.421537Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

A flaw was found in the Keylime registrar that could allow a bypass of the challenge-response protocol during agent registration. This issue may allow an attacker to impersonate an agent and hide the true status of a monitored machine if the fake agent is added to the verifier list by a legitimate user, resulting in a breach of the integrity of the registrar database.

References

Affected packages

Git / github.com/keylime/keylime

Affected ranges

Type
GIT
Repo
https://github.com/keylime/keylime
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

5.*

5.0.0
5.1.0
5.2.0
5.3.0
5.3.1
5.4.0
5.4.1
5.5.0
5.6.0
5.6.1
5.6.2
5.7.0
5.7.1
5.7.2
5.7.3
5.8.0
5.8.1

6.*

6.0.0
6.0.1
6.1.0
6.1.1

v2.*

v2.0
v2.1
v2.1.1
v2.2
v2.3
v2.3.1
v2.3.2
v2.3.3
v2.3.4

v3.*

v3.0.0
v3.1.0
v3.1.1

v4.*

v4.0.0
v4.0.1

v5.*

v5.8.1

v6.*

v6.2.0
v6.2.1
v6.3.0
v6.3.1
v6.3.2
v6.4.0
v6.4.1
v6.4.2
v6.4.3
v6.5.0
v6.5.1
v6.5.2
v6.5.3
v6.6.0
v6.7.0

v7.*

v7.0.0
v7.2.5
v7.3.0
v7.4.0