Skip to main content

CVE-2022-23952: CWE-200 in keylime

High
VulnerabilityCVE-2022-23952cvecve-2022-23952cwe-200
Published: Wed Sep 21 2022 (09/21/2022, 18:25:13 UTC)
Source: CVE
Vendor/Project: n/a
Product: keylime

Description

In Keylime before 6.3.0, current keylime installer installs the keylime.conf file, which can contain sensitive data, as world-readable.

AI-Powered Analysis

AILast updated: 07/08/2025, 07:26:59 UTC

Technical Analysis

CVE-2022-23952 is a security vulnerability identified in the Keylime software prior to version 6.3.0. Keylime is a remote attestation framework designed to ensure the integrity of systems, often used in cloud and edge computing environments to verify that a system's software stack has not been tampered with. The vulnerability arises from the Keylime installer placing the keylime.conf configuration file with overly permissive file permissions, specifically making it world-readable. This configuration file can contain sensitive information, such as cryptographic keys, tokens, or other secrets necessary for the secure operation of Keylime. The exposure of such sensitive data to any user on the system constitutes an information disclosure vulnerability, classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The CVSS v3.1 base score for this vulnerability is 7.5, indicating a high severity level. The vector string (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) shows that the vulnerability is remotely exploitable over the network without any privileges or user interaction, and it impacts confidentiality with high impact, but does not affect integrity or availability. Although no known exploits are reported in the wild, the nature of the vulnerability allows an attacker with local access to the system to read sensitive configuration data, potentially enabling further attacks or unauthorized access. The vulnerability was published on September 21, 2022, and affects Keylime versions before 6.3.0. No patch links are provided in the data, but upgrading to version 6.3.0 or later is implied as a remediation step. The vulnerability was assigned and published by Fedora's security team and is enriched by CISA, indicating recognition by US cybersecurity authorities.

Potential Impact

For European organizations, the impact of CVE-2022-23952 can be significant, especially for those relying on Keylime for system integrity verification in cloud, edge, or critical infrastructure environments. Exposure of sensitive configuration data can lead to unauthorized disclosure of cryptographic keys or tokens, which may allow attackers to bypass attestation mechanisms, impersonate trusted systems, or escalate privileges. This undermines the trustworthiness of the security posture and could facilitate further attacks such as lateral movement, data exfiltration, or sabotage. Organizations in sectors like finance, healthcare, telecommunications, and government, which often deploy advanced attestation frameworks to secure their infrastructure, are particularly at risk. Moreover, since the vulnerability requires no user interaction and can be exploited remotely if an attacker gains network access, it broadens the attack surface. The confidentiality breach could also lead to compliance violations under GDPR and other European data protection regulations if sensitive personal or operational data is indirectly exposed or compromised due to this vulnerability.

Mitigation Recommendations

European organizations should take the following specific mitigation steps: 1) Immediately upgrade Keylime installations to version 6.3.0 or later, where the file permission issue has been corrected. 2) Audit existing Keylime deployments to verify the permissions of keylime.conf and restrict them to the minimum necessary, ideally readable only by the Keylime service user or root. 3) Implement strict access controls and monitoring on systems running Keylime to detect unauthorized access attempts to configuration files. 4) Employ file integrity monitoring solutions to alert on unexpected permission changes or access to sensitive files. 5) Review and rotate any cryptographic keys or tokens that may have been exposed due to this vulnerability. 6) Harden network access to Keylime hosts by limiting exposure to trusted networks and enforcing strong authentication and network segmentation. 7) Incorporate this vulnerability into incident response and risk assessment processes to ensure timely detection and remediation of any exploitation attempts. These steps go beyond generic patching by emphasizing proactive access control, monitoring, and key management tailored to the nature of the vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
fedora
Date Reserved
2022-01-25T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682f6ee00acd01a2492646f1

Added to database: 5/22/2025, 6:37:20 PM

Last enriched: 7/8/2025, 7:26:59 AM

Last updated: 8/15/2025, 8:40:56 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats