Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. keylime
  4. ›
  5. GHSA-27jc-jmp8-qfw5

GHSA-27jc-jmp8-qfw5: Duplicate Advisory: Keylime Missing Authentication for Critical Function and Improper Authentication

February 6, 2026

Duplicate Advisory

This advisory has been withdrawn because it is a duplicate of GHSA-4jqp-9qjv-57m2. This link is maintained to preserve external references.

Original Description

A flaw was found in Keylime. The Keylime registrar, since version 7.12.0, does not enforce client-side Transport Layer Security (TLS) authentication. This authentication bypass vulnerability allows unauthenticated clients with network access to perform administrative operations, including listing agents, retrieving public Trusted Platform Module (TPM) data, and deleting agents, by connecting without presenting a client certificate.

References

  • access.redhat.com/security/cve/CVE-2026-1709
  • bugzilla.redhat.com/show_bug.cgi?id=2435514
  • github.com/advisories/GHSA-27jc-jmp8-qfw5
  • nvd.nist.gov/vuln/detail/CVE-2026-1709

Code Behaviors & Features

Detect and mitigate GHSA-27jc-jmp8-qfw5 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 7.12.0 before 7.12.2, all versions starting from 7.13.0 before 7.13.1, version 7.13.0

Fixed versions

  • 7.12.2
  • 7.13.1

Solution

Upgrade to versions 7.12.2, 7.13.1 or above.

Impact 9.4 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-322: Key Exchange without Entity Authentication

Source file

pypi/keylime/GHSA-27jc-jmp8-qfw5.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 07 Feb 2026 00:18:19 +0000.