{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-2886","assignerOrgId":"ff89ba41-3aa1-4d27-914a-91399e9639e5","state":"PUBLISHED","assignerShortName":"AMZN","dateReserved":"2025-03-27T21:08:14.876Z","datePublished":"2025-03-27T22:22:14.382Z","dateUpdated":"2025-10-14T18:23:47.183Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"tough","repo":"https://github.com/awslabs/tough","vendor":"AWS","versions":[{"lessThan":"0.20.0","status":"affected","version":"0.1.0","versionType":"semver"}]}],"datePublic":"2025-03-27T21:30:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p></p><p></p><p>Missing validation of terminating delegation causes the client to continue searching the defined delegation list, even after searching a terminating delegation. This could cause the client to fetch a target from an incorrect source, altering the target contents. Users should upgrade to tough version 0.20.0 or later and ensure any forked or derivative code is patched to incorporate the new fixes.</p><p></p><p></p>"}],"value":"Missing validation of terminating delegation causes the client to continue searching the defined delegation list, even after searching a terminating delegation. This could cause the client to fetch a target from an incorrect source, altering the target contents. Users should upgrade to tough version 0.20.0 or later and ensure any forked or derivative code is patched to incorporate the new fixes."}],"impacts":[{"capecId":"CAPEC-439","descriptions":[{"lang":"en","value":"CAPEC-439 Manipulation During Distribution"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"HIGH","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":5.7,"baseSeverity":"MEDIUM","privilegesRequired":"HIGH","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"PASSIVE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-670","description":"CWE-670 Always-Incorrect Control Flow Implementation","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"ff89ba41-3aa1-4d27-914a-91399e9639e5","shortName":"AMZN","dateUpdated":"2025-10-14T18:23:47.183Z"},"references":[{"tags":["vendor-advisory"],"url":"https://github.com/awslabs/tough/security/advisories/GHSA-v4wr-j3w6-mxqc"},{"tags":["vendor-advisory"],"url":"https://aws.amazon.com/security/security-bulletins/AWS-2025-007/"},{"tags":["patch"],"url":"https://github.com/awslabs/tough/releases/tag/tough-v0.20.0"}],"source":{"discovery":"UNKNOWN"},"title":"Terminating targets role delegations are not respected in tough","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-03-28T15:43:34.765460Z","id":"CVE-2025-2886","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-28T15:43:49.713Z"}}]}}