Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-3674: Mutable Attestation or Measurement Reporting Data in Red Hat Red Hat Enterprise Linux 9

0
Low
VulnerabilityCVE-2023-3674cvecve-2023-3674
Published: Wed Jul 19 2023 (07/19/2023, 18:25:28 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 9

Description

A flaw was found in the keylime attestation verifier, which fails to flag a device's submitted TPM quote as faulty when the quote's signature does not validate for some reason. Instead, it will only emit an error in the log without flagging the device as untrusted.

AI-Powered Analysis

AILast updated: 11/21/2025, 07:03:26 UTC

Technical Analysis

CVE-2023-3674 identifies a vulnerability in the keylime attestation verifier used in Red Hat Enterprise Linux 9. Keylime is a framework that performs remote attestation by verifying TPM (Trusted Platform Module) quotes from devices to ensure their integrity and trustworthiness. The vulnerability arises because the verifier does not properly flag a TPM quote as faulty when its signature validation fails. Instead of marking the device as untrusted, the verifier only logs an error message, effectively allowing devices with invalid or tampered TPM quotes to be treated as trusted. This undermines the core security principle of attestation, which is to ensure that only devices with verified integrity are trusted. The flaw requires local privileges to exploit since the CVSS vector indicates attack vector as local (AV:L) and privileges required as high (PR:H). There is no user interaction needed (UI:N), and the scope is unchanged (S:U). The impact on confidentiality is none (C:N), but integrity is slightly impacted (I:L) because untrusted devices might be accepted, while availability is unaffected (A:N). No known exploits are reported in the wild, and no patches have been linked yet, though the vulnerability is publicly disclosed. This issue is particularly relevant for environments relying on TPM-based attestation for device trust decisions, such as secure cloud deployments, critical infrastructure, and enterprise environments using Red Hat Enterprise Linux 9.

Potential Impact

For European organizations, the primary impact is a degradation of trust in device attestation processes that rely on TPM quotes verified by keylime on Red Hat Enterprise Linux 9 systems. This could allow devices with compromised or tampered TPM data to be erroneously trusted, potentially enabling unauthorized access or persistence within sensitive environments. While the vulnerability does not directly expose confidential data or cause denial of service, it weakens the integrity guarantees of attestation, which is critical in high-security sectors such as finance, government, and critical infrastructure. Organizations using Red Hat Enterprise Linux 9 with TPM attestation in cloud or on-premises environments may face increased risk of insider threats or lateral movement by attackers who can exploit this flaw. The low CVSS score reflects the limited scope and difficulty of exploitation, but the security impact in environments relying heavily on attestation can be significant. The absence of known exploits reduces immediate risk but does not eliminate the need for vigilance.

Mitigation Recommendations

European organizations should implement the following mitigations: 1) Monitor keylime attestation logs closely for any signature validation errors to detect potential misuse or exploitation attempts. 2) Restrict local privileged access to systems running keylime to minimize the risk of exploitation by unauthorized users. 3) Employ additional layers of device trust verification beyond TPM quotes, such as behavioral monitoring or network segmentation, to reduce reliance on a single attestation mechanism. 4) Stay informed about vendor advisories and apply patches or updates from Red Hat promptly once available. 5) Conduct regular security audits and penetration tests focusing on attestation mechanisms to identify weaknesses. 6) Consider deploying compensating controls such as multi-factor authentication and strict access controls on critical systems. 7) Engage with Red Hat support or security teams for guidance on mitigating this vulnerability in specific deployment scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2023-07-14T12:39:01.155Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e901b8fd0dca528e8b9a51

Added to database: 10/10/2025, 12:53:12 PM

Last enriched: 11/21/2025, 7:03:26 AM

Last updated: 12/4/2025, 7:34:11 PM

Views: 45

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats