CVE-2023-38201

MEDIUM

Keylime Registrar - Auth Bypass

Title source: llm
STIX 2.1

Description

A flaw was found in the Keylime registrar that could allow a bypass of the challenge-response protocol during agent registration. This issue may allow an attacker to impersonate an agent and hide the true status of a monitored machine if the fake agent is added to the verifier list by a legitimate user, resulting in a breach of the integrity of the registrar database.

Scores

CVSS v3 6.5
EPSS 0.0002
EPSS Percentile 6.4%
Attack Vector ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Details

CWE
CWE-639
Status published
Products (10)
fedoraproject/fedora 38
keylime/keylime < 7.5.0
pypi/keylime 0 - 7.5.0PyPI
redhat/enterprise_linux 9.0
redhat/enterprise_linux_eus 9.2
redhat/enterprise_linux_for_ibm_z_systems 9.0_s390x
redhat/enterprise_linux_for_ibm_z_systems_eus 9.2_s390x
redhat/enterprise_linux_for_power_little_endian 9.0_ppc64le
redhat/enterprise_linux_for_power_little_endian_eus 9.2_ppc64le
redhat/enterprise_linux_server_aus 9.2
Published Aug 25, 2023
Tracked Since Feb 18, 2026