Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61779: CWE-639: Authorization Bypass Through User-Controlled Key in confidential-containers trustee

0
High
VulnerabilityCVE-2025-61779cvecve-2025-61779cwe-639
Published: Thu Oct 09 2025 (10/09/2025, 20:53:33 UTC)
Source: CVE Database V5
Vendor/Project: confidential-containers
Product: trustee

Description

Confidential Containers's Trustee project contains tools and components for attesting confidential guests and providing secrets to them. In versions prior to 0.15.0, the attestation-policy endpoint didn't check if the kbs-client submitting the request was actually authenticated (had the right key). This allowed any kbs-client to actually change the attestation policy. Version 0.15.0 fixes the issue.

AI-Powered Analysis

AILast updated: 10/09/2025, 21:22:55 UTC

Technical Analysis

The vulnerability identified as CVE-2025-61779 affects the Confidential Containers Trustee project, a component responsible for attesting confidential guests and securely providing secrets to them. Specifically, in versions prior to 0.15.0, the attestation-policy endpoint failed to verify whether the requesting kbs-client was authenticated and authorized to make changes. This lack of authentication checks means that any kbs-client, including unauthenticated or malicious clients, could submit requests to alter the attestation policy. Attestation policies are critical because they define the criteria under which confidential guests are trusted and granted access to secrets. Unauthorized modification of these policies can undermine the entire security model of confidential containers, potentially allowing malicious guests to bypass security controls or gain unauthorized access to sensitive secrets. The vulnerability is classified under CWE-639 (Authorization Bypass Through User-Controlled Key), highlighting that the flaw arises from improper authorization checks. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N) indicates that the vulnerability is remotely exploitable over the network without any authentication or user interaction, with low attack complexity and a high impact on integrity. Although no known exploits are currently reported in the wild, the severity and ease of exploitation make it a critical threat. The issue was addressed in version 0.15.0 of the Trustee project, which introduced proper authentication checks on the attestation-policy endpoint to ensure only authorized kbs-clients can modify policies. Organizations using affected versions should prioritize upgrading and reviewing their attestation policies for unauthorized changes.

Potential Impact

For European organizations, the impact of CVE-2025-61779 is significant, particularly for those leveraging confidential computing environments that depend on the Confidential Containers Trustee for secure attestation and secret management. Unauthorized modification of attestation policies can lead to compromised integrity of the attestation process, allowing malicious actors to bypass security controls, potentially access sensitive secrets, or deploy untrusted workloads within supposedly secure environments. This undermines trust in confidential computing deployments, which are increasingly adopted in sectors such as finance, healthcare, and government across Europe. The vulnerability's network-exploitable nature means attackers can remotely target affected systems without prior access or user interaction, increasing the risk of widespread exploitation. Although confidentiality impact is indirect, the integrity and availability of secure attestation services are at risk, potentially leading to broader security breaches or data exposure. The lack of known exploits in the wild suggests limited immediate threat, but the high CVSS score and ease of exploitation warrant urgent remediation to prevent future attacks.

Mitigation Recommendations

To mitigate CVE-2025-61779, European organizations should immediately upgrade the Confidential Containers Trustee component to version 0.15.0 or later, where the authentication checks on the attestation-policy endpoint have been implemented. Additionally, organizations should audit existing attestation policies to detect any unauthorized or suspicious changes that may have occurred prior to patching. Implement network segmentation and access controls to restrict which clients can communicate with the Trustee service, limiting exposure to untrusted kbs-clients. Employ monitoring and alerting on attestation-policy changes to detect anomalous activity promptly. Where possible, integrate multi-factor authentication or stronger client authentication mechanisms for kbs-clients interacting with the Trustee. Regularly review and update security policies governing confidential computing environments to ensure adherence to best practices. Finally, maintain awareness of updates from the Confidential Containers project and apply security patches promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-30T19:43:49.901Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e8243cba0e608b4facfb43

Added to database: 10/9/2025, 9:08:12 PM

Last enriched: 10/9/2025, 9:22:55 PM

Last updated: 10/11/2025, 11:51:06 AM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats