Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13609: Use of Multiple Resources with Duplicate Identifier in Keylime Project keylime

0
High
VulnerabilityCVE-2025-13609cvecve-2025-13609
Published: Mon Nov 24 2025 (11/24/2025, 18:08:56 UTC)
Source: CVE Database V5
Vendor/Project: Keylime Project
Product: keylime

Description

A vulnerability has been identified in keylime where an attacker can exploit this flaw by registering a new agent using a different Trusted Platform Module (TPM) device but claiming an existing agent's unique identifier (UUID). This action overwrites the legitimate agent's identity, enabling the attacker to impersonate the compromised agent and potentially bypass security controls.

AI-Powered Analysis

AILast updated: 12/23/2025, 16:31:50 UTC

Technical Analysis

CVE-2025-13609 is a vulnerability identified in the Keylime project, an open-source framework designed for remote attestation and trusted computing using Trusted Platform Modules (TPMs). The flaw arises because the system allows multiple resources to be registered with duplicate unique identifiers (UUIDs). Specifically, an attacker who has network access and high privileges can register a new agent using a different TPM device but claim the UUID of an existing legitimate agent. This action overwrites the legitimate agent's identity in the system, effectively enabling the attacker to impersonate the compromised agent. Such impersonation can lead to bypassing security controls that rely on the integrity and authenticity of the agent's identity, undermining trust in the attestation process. The vulnerability has a CVSS 3.1 base score of 8.2, reflecting high severity due to low attack complexity, no user interaction, and a scope change affecting confidentiality, integrity, and availability. While no exploits are currently known in the wild, the potential impact on systems relying on Keylime for secure attestation is significant. The vulnerability affects all versions of Keylime prior to the fix, and no patch links are currently provided, indicating the need for vigilance and prompt updates once available.

Potential Impact

For European organizations, the impact of CVE-2025-13609 can be substantial, especially for those relying on Keylime for trusted computing environments, such as critical infrastructure, government agencies, and enterprises with high security requirements. The ability for an attacker to impersonate a legitimate agent undermines the trust model of remote attestation, potentially allowing unauthorized access to sensitive systems and data. This can lead to data breaches, unauthorized command execution, and disruption of services. Given the vulnerability affects confidentiality, integrity, and availability, organizations could face regulatory compliance issues under GDPR if personal data is compromised. The attack requires high privileges, so insider threats or compromised administrative accounts pose a significant risk. The lack of known exploits in the wild provides a window for proactive defense, but the high severity score indicates that exploitation could have severe consequences.

Mitigation Recommendations

1. Monitor and audit agent registration logs to detect duplicate UUID registrations or unusual TPM device changes. 2. Restrict agent registration privileges strictly to trusted administrators and enforce multi-factor authentication for such accounts. 3. Implement network segmentation to limit access to the Keylime registration service, reducing exposure to potential attackers. 4. Once patches or updates are released by the Keylime project, apply them promptly to eliminate the vulnerability. 5. Employ additional validation mechanisms to verify TPM device authenticity beyond UUID matching, such as cryptographic attestation checks. 6. Use anomaly detection tools to identify suspicious agent behavior indicative of impersonation attempts. 7. Educate security teams about this vulnerability and incorporate checks into incident response plans. 8. Consider temporary compensating controls like disabling remote agent registration if feasible until a patch is applied.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2025-11-24T15:47:12.935Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6924a2b20ea9183d5bf9f772

Added to database: 11/24/2025, 6:23:46 PM

Last enriched: 12/23/2025, 4:31:50 PM

Last updated: 1/8/2026, 10:15:20 PM

Views: 88

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats