{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-13609","assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","state":"PUBLISHED","assignerShortName":"redhat","dateReserved":"2025-11-24T15:47:12.935Z","datePublished":"2025-11-24T18:08:56.048Z","dateUpdated":"2026-03-19T15:35:28.654Z"},"containers":{"cna":{"title":"Keylime: keylime: registrar allows identity takeover via duplicate uuid registration","metrics":[{"other":{"content":{"value":"Important","namespace":"https://access.redhat.com/security/updates/classification/"},"type":"Red Hat severity rating"}},{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":8.2,"baseSeverity":"HIGH","confidentialityImpact":"LOW","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:L","version":"3.1"},"format":"CVSS"}],"descriptions":[{"lang":"en","value":"A vulnerability has been identified in keylime where an attacker can exploit this flaw by registering a new agent using a different Trusted Platform Module (TPM) device but claiming an existing agent's unique identifier (UUID). This action overwrites the legitimate agent's identity, enabling the attacker to impersonate the compromised agent and potentially bypass security controls."}],"affected":[{"vendor":"Keylime Project","product":"keylime","versions":[{"status":"affected","version":"0","lessThan":"7.14.0","versionType":"semver"}],"packageName":"keylime","collectionURL":"https://github.com/keylime/keylime","defaultStatus":"unaffected"},{"vendor":"Red Hat","product":"Red Hat Enterprise Linux 10","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"keylime","defaultStatus":"affected","versions":[{"version":"0:7.12.1-11.el10_1.3","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/o:redhat:enterprise_linux:10.1"]},{"vendor":"Red Hat","product":"Red Hat Enterprise Linux 10.0 Extended Update Support","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"keylime","defaultStatus":"affected","versions":[{"version":"0:7.12.1-2.el10_0.4","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/o:redhat:enterprise_linux_eus:10.0"]},{"vendor":"Red Hat","product":"Red Hat Enterprise Linux 9","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"keylime","defaultStatus":"affected","versions":[{"version":"0:7.12.1-11.el9_7.3","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:enterprise_linux:9::appstream"]},{"vendor":"Red Hat","product":"Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"keylime","defaultStatus":"affected","versions":[{"version":"0:6.5.2-6.el9_2.1","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:rhel_e4s:9.2::appstream"]},{"vendor":"Red Hat","product":"Red Hat Enterprise Linux 9.4 Extended Update Support","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"keylime","defaultStatus":"affected","versions":[{"version":"0:7.3.0-13.el9_4.1","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:rhel_eus:9.4::appstream"]},{"vendor":"Red Hat","product":"Red Hat Enterprise Linux 9.6 Extended Update Support","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"keylime","defaultStatus":"affected","versions":[{"version":"0:7.3.0-15.el9_6.1","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:rhel_eus:9.6::appstream"]}],"references":[{"url":"https://access.redhat.com/errata/RHSA-2025:23201","name":"RHSA-2025:23201","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2025:23210","name":"RHSA-2025:23210","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2025:23628","name":"RHSA-2025:23628","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2025:23735","name":"RHSA-2025:23735","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2025:23852","name":"RHSA-2025:23852","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2026:0429","name":"RHSA-2026:0429","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/security/cve/CVE-2025-13609","tags":["vdb-entry","x_refsource_REDHAT"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416761","name":"RHBZ#2416761","tags":["issue-tracking","x_refsource_REDHAT"]},{"url":"https://github.com/keylime/keylime/issues/1820"}],"datePublic":"2025-11-24T16:00:06.761Z","problemTypes":[{"descriptions":[{"cweId":"CWE-694","description":"Use of Multiple Resources with Duplicate Identifier","lang":"en","type":"CWE"}]}],"x_redhatCweChain":"CWE-694: Use of Multiple Resources with Duplicate Identifier","workarounds":[{"lang":"en","value":"Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible."}],"timeline":[{"lang":"en","time":"2025-11-24T14:53:54.188Z","value":"Reported to Red Hat."},{"lang":"en","time":"2025-11-24T16:00:06.761Z","value":"Made public."}],"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2026-03-19T15:35:28.654Z"},"x_generator":{"engine":"cvelib 1.8.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-11-24T19:00:14.018523Z","id":"CVE-2025-13609","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-11-24T19:00:31.365Z"}}]}}