CVE-2025-13609

8.2 HIGH

📋 TL;DR

This vulnerability in keylime allows attackers to impersonate legitimate agents by registering a new agent with a different TPM device while claiming an existing agent's UUID. This identity overwrite enables bypassing security controls and potentially compromising trusted computing environments. Organizations using keylime for remote attestation and integrity verification are affected.

💻 Affected Systems

Products:
  • keylime
Versions: All versions prior to patched releases
Operating Systems: Linux distributions with keylime packages
Default Config Vulnerable: ⚠️ Yes
Notes: Affects keylime deployments using TPM-based attestation; requires attacker access to register new agents.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of trusted computing infrastructure, allowing attackers to bypass remote attestation, inject malicious code into trusted systems, and establish persistent access to sensitive environments.

🟠

Likely Case

Unauthorized access to systems protected by keylime, potential data exfiltration, and compromise of integrity verification mechanisms leading to false trust in compromised systems.

🟢

If Mitigated

Limited impact with proper network segmentation, monitoring, and additional authentication layers preventing successful exploitation despite the vulnerability.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires ability to register new agents and knowledge of existing agent UUIDs; TPM device access needed for registration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Red Hat advisories for specific patched versions

Vendor Advisory: https://access.redhat.com/errata/RHSA-2025:23201

Restart Required: Yes

Instructions:

1. Update keylime packages using your distribution's package manager. 2. Restart keylime services. 3. Verify agent registrations are legitimate.

🔧 Temporary Workarounds

Restrict Agent Registration

linux

Limit who can register new agents through network controls and authentication

# Configure firewall rules to restrict access to keylime registration endpoints
# Implement additional authentication for agent registration

Monitor Agent UUID Changes

all

Set up alerts for unexpected agent UUID modifications or duplicate UUIDs

# Monitor keylime logs for registration events
# Alert on UUID changes for existing agents

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate keylime infrastructure
  • Enable detailed logging and monitoring for all agent registration activities

🔍 How to Verify

Check if Vulnerable:

Check keylime version and compare against patched versions in Red Hat advisories

Check Version:

rpm -q keylime || keylime_verifier --version || python3 -c "import keylime; print(keylime.__version__)"

Verify Fix Applied:

Verify keylime version is updated and test agent registration with duplicate UUIDs (should be rejected)

📡 Detection & Monitoring

Log Indicators:

  • Multiple agents with same UUID
  • Unexpected agent registration events
  • Agent UUID changes without proper authorization

Network Indicators:

  • Unusual registration requests to keylime endpoints
  • Traffic from unauthorized sources to registration ports

SIEM Query:

source="keylime" AND ("register" OR "uuid") | stats count by uuid | where count > 1

🔗 References

📤 Share & Export