Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Sat, 11 Oct 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Fri, 10 Oct 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 10 Oct 2025 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Confidential-containers
Confidential-containers trustee |
|
| Vendors & Products |
Confidential-containers
Confidential-containers trustee |
Thu, 09 Oct 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Confidential Containers's Trustee project contains tools and components for attesting confidential guests and providing secrets to them. In versions prior to 0.15.0, the attestation-policy endpoint didn't check if the kbs-client submitting the request was actually authenticated (had the right key). This allowed any kbs-client to actually change the attestation policy. Version 0.15.0 fixes the issue. | |
| Title | Trustee's attestation-policy endpoint is not protected by admin autentication | |
| Weaknesses | CWE-639 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-10-10T14:32:49.097Z
Reserved: 2025-09-30T19:43:49.901Z
Link: CVE-2025-61779
Updated: 2025-10-10T14:32:38.952Z
Status : Deferred
Published: 2025-10-09T21:15:39.960
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-61779
OpenCVE Enrichment
Updated: 2025-10-10T11:17:35Z