CVE-2025-13609: Use of Multiple Resources with Duplicate Identifier in Keylime Project keylime
A vulnerability has been identified in keylime where an attacker can exploit this flaw by registering a new agent using a different Trusted Platform Module (TPM) device but claiming an existing agent's unique identifier (UUID). This action overwrites the legitimate agent's identity, enabling the attacker to impersonate the compromised agent and potentially bypass security controls.
AI Analysis
Technical Summary
CVE-2025-13609 is a vulnerability identified in the Keylime project, an open-source framework designed for remote attestation and trusted computing using Trusted Platform Modules (TPMs). The flaw arises because the system allows multiple resources to be registered with duplicate unique identifiers (UUIDs). Specifically, an attacker who has network access and high privileges can register a new agent using a different TPM device but claim the UUID of an existing legitimate agent. This action overwrites the legitimate agent's identity in the system, effectively enabling the attacker to impersonate the compromised agent. Such impersonation can lead to bypassing security controls that rely on the integrity and authenticity of the agent's identity, undermining trust in the attestation process. The vulnerability has a CVSS 3.1 base score of 8.2, reflecting high severity due to low attack complexity, no user interaction, and a scope change affecting confidentiality, integrity, and availability. While no exploits are currently known in the wild, the potential impact on systems relying on Keylime for secure attestation is significant. The vulnerability affects all versions of Keylime prior to the fix, and no patch links are currently provided, indicating the need for vigilance and prompt updates once available.
Potential Impact
For European organizations, the impact of CVE-2025-13609 can be substantial, especially for those relying on Keylime for trusted computing environments, such as critical infrastructure, government agencies, and enterprises with high security requirements. The ability for an attacker to impersonate a legitimate agent undermines the trust model of remote attestation, potentially allowing unauthorized access to sensitive systems and data. This can lead to data breaches, unauthorized command execution, and disruption of services. Given the vulnerability affects confidentiality, integrity, and availability, organizations could face regulatory compliance issues under GDPR if personal data is compromised. The attack requires high privileges, so insider threats or compromised administrative accounts pose a significant risk. The lack of known exploits in the wild provides a window for proactive defense, but the high severity score indicates that exploitation could have severe consequences.
Mitigation Recommendations
1. Monitor and audit agent registration logs to detect duplicate UUID registrations or unusual TPM device changes. 2. Restrict agent registration privileges strictly to trusted administrators and enforce multi-factor authentication for such accounts. 3. Implement network segmentation to limit access to the Keylime registration service, reducing exposure to potential attackers. 4. Once patches or updates are released by the Keylime project, apply them promptly to eliminate the vulnerability. 5. Employ additional validation mechanisms to verify TPM device authenticity beyond UUID matching, such as cryptographic attestation checks. 6. Use anomaly detection tools to identify suspicious agent behavior indicative of impersonation attempts. 7. Educate security teams about this vulnerability and incorporate checks into incident response plans. 8. Consider temporary compensating controls like disabling remote agent registration if feasible until a patch is applied.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Estonia
CVE-2025-13609: Use of Multiple Resources with Duplicate Identifier in Keylime Project keylime
Description
A vulnerability has been identified in keylime where an attacker can exploit this flaw by registering a new agent using a different Trusted Platform Module (TPM) device but claiming an existing agent's unique identifier (UUID). This action overwrites the legitimate agent's identity, enabling the attacker to impersonate the compromised agent and potentially bypass security controls.
AI-Powered Analysis
Technical Analysis
CVE-2025-13609 is a vulnerability identified in the Keylime project, an open-source framework designed for remote attestation and trusted computing using Trusted Platform Modules (TPMs). The flaw arises because the system allows multiple resources to be registered with duplicate unique identifiers (UUIDs). Specifically, an attacker who has network access and high privileges can register a new agent using a different TPM device but claim the UUID of an existing legitimate agent. This action overwrites the legitimate agent's identity in the system, effectively enabling the attacker to impersonate the compromised agent. Such impersonation can lead to bypassing security controls that rely on the integrity and authenticity of the agent's identity, undermining trust in the attestation process. The vulnerability has a CVSS 3.1 base score of 8.2, reflecting high severity due to low attack complexity, no user interaction, and a scope change affecting confidentiality, integrity, and availability. While no exploits are currently known in the wild, the potential impact on systems relying on Keylime for secure attestation is significant. The vulnerability affects all versions of Keylime prior to the fix, and no patch links are currently provided, indicating the need for vigilance and prompt updates once available.
Potential Impact
For European organizations, the impact of CVE-2025-13609 can be substantial, especially for those relying on Keylime for trusted computing environments, such as critical infrastructure, government agencies, and enterprises with high security requirements. The ability for an attacker to impersonate a legitimate agent undermines the trust model of remote attestation, potentially allowing unauthorized access to sensitive systems and data. This can lead to data breaches, unauthorized command execution, and disruption of services. Given the vulnerability affects confidentiality, integrity, and availability, organizations could face regulatory compliance issues under GDPR if personal data is compromised. The attack requires high privileges, so insider threats or compromised administrative accounts pose a significant risk. The lack of known exploits in the wild provides a window for proactive defense, but the high severity score indicates that exploitation could have severe consequences.
Mitigation Recommendations
1. Monitor and audit agent registration logs to detect duplicate UUID registrations or unusual TPM device changes. 2. Restrict agent registration privileges strictly to trusted administrators and enforce multi-factor authentication for such accounts. 3. Implement network segmentation to limit access to the Keylime registration service, reducing exposure to potential attackers. 4. Once patches or updates are released by the Keylime project, apply them promptly to eliminate the vulnerability. 5. Employ additional validation mechanisms to verify TPM device authenticity beyond UUID matching, such as cryptographic attestation checks. 6. Use anomaly detection tools to identify suspicious agent behavior indicative of impersonation attempts. 7. Educate security teams about this vulnerability and incorporate checks into incident response plans. 8. Consider temporary compensating controls like disabling remote agent registration if feasible until a patch is applied.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- redhat
- Date Reserved
- 2025-11-24T15:47:12.935Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6924a2b20ea9183d5bf9f772
Added to database: 11/24/2025, 6:23:46 PM
Last enriched: 12/23/2025, 4:31:50 PM
Last updated: 1/8/2026, 10:15:20 PM
Views: 88
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0729: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2025-14436: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in neeraj_slit Brevo for WooCommerce
HighCVE-2025-68718: n/a
MediumCVE-2025-15464: CWE-926 Improper Export of Android Application Components in yintibao Fun Print Mobile
HighCVE-2025-14505: CWE-1240: Use of a Cryptographic Primitive with a Risky Implementation in Elliptic
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.