CVE-2025-1057

MEDIUM

Keylime <7.12.0 - Info Disclosure

Title source: llm
STIX 2.1

Description

A flaw was found in Keylime, a remote attestation solution, where strict type checking introduced in version 7.12.0 prevents the registrar from reading database entries created by previous versions, for example, 7.11.0. Specifically, older versions store agent registration data as bytes, whereas the updated registrar expects str. This issue leads to an exception when processing agent registration requests, causing the agent to fail.

Scores

CVSS v3 4.3
EPSS 0.0007
EPSS Percentile 21.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-704
Status published
Products (3)
pypi/keylime 7.12.0 - 7.12.1PyPI
Red Hat/Red Hat Enterprise Linux 10
Red Hat/Red Hat Enterprise Linux 9
Published Mar 15, 2025
Tracked Since Feb 18, 2026