Description
Python TUF (The Update Framework) reference implementation before version 0.12 it will incorrectly trust a previously downloaded root metadata file which failed verification at download time. This allows an attacker who is able to serve multiple new versions of root metadata (i.e. by a person-in-the-middle attack) culminating in a version which has not been correctly signed to control the trust chain for future updates. This is fixed in version 0.12 and newer.
Published: 2020-09-09
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-0224 Python TUF (The Update Framework) reference implementation before version 0.12 it will incorrectly trust a previously downloaded root metadata file which failed verification at download time. This allows an attacker who is able to serve multiple new versions of root metadata (i.e. by a person-in-the-middle attack) culminating in a version which has not been correctly signed to control the trust chain for future updates. This is fixed in version 0.12 and newer.
Github GHSA Github GHSA GHSA-f8mr-jv2c-v8mg Invalid root may become trusted root in The Update Framework (TUF)
History

No history.

Subscriptions

Linuxfoundation The Update Framework
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-04T13:08:22.456Z

Reserved: 2020-06-25T00:00:00.000Z

Link: CVE-2020-15163

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-09-09T18:15:22.480

Modified: 2024-11-21T05:04:58.837

Link: CVE-2020-15163

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses