CVE-2025-61779: CWE-639: Authorization Bypass Through User-Controlled Key in confidential-containers trustee
Confidential Containers's Trustee project contains tools and components for attesting confidential guests and providing secrets to them. In versions prior to 0.15.0, the attestation-policy endpoint didn't check if the kbs-client submitting the request was actually authenticated (had the right key). This allowed any kbs-client to actually change the attestation policy. Version 0.15.0 fixes the issue.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-61779 affects the Confidential Containers Trustee project, a component responsible for attesting confidential guests and securely providing secrets to them. Specifically, in versions prior to 0.15.0, the attestation-policy endpoint failed to verify whether the requesting kbs-client was authenticated and authorized to make changes. This lack of authentication checks means that any kbs-client, including unauthenticated or malicious clients, could submit requests to alter the attestation policy. Attestation policies are critical because they define the criteria under which confidential guests are trusted and granted access to secrets. Unauthorized modification of these policies can undermine the entire security model of confidential containers, potentially allowing malicious guests to bypass security controls or gain unauthorized access to sensitive secrets. The vulnerability is classified under CWE-639 (Authorization Bypass Through User-Controlled Key), highlighting that the flaw arises from improper authorization checks. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N) indicates that the vulnerability is remotely exploitable over the network without any authentication or user interaction, with low attack complexity and a high impact on integrity. Although no known exploits are currently reported in the wild, the severity and ease of exploitation make it a critical threat. The issue was addressed in version 0.15.0 of the Trustee project, which introduced proper authentication checks on the attestation-policy endpoint to ensure only authorized kbs-clients can modify policies. Organizations using affected versions should prioritize upgrading and reviewing their attestation policies for unauthorized changes.
Potential Impact
For European organizations, the impact of CVE-2025-61779 is significant, particularly for those leveraging confidential computing environments that depend on the Confidential Containers Trustee for secure attestation and secret management. Unauthorized modification of attestation policies can lead to compromised integrity of the attestation process, allowing malicious actors to bypass security controls, potentially access sensitive secrets, or deploy untrusted workloads within supposedly secure environments. This undermines trust in confidential computing deployments, which are increasingly adopted in sectors such as finance, healthcare, and government across Europe. The vulnerability's network-exploitable nature means attackers can remotely target affected systems without prior access or user interaction, increasing the risk of widespread exploitation. Although confidentiality impact is indirect, the integrity and availability of secure attestation services are at risk, potentially leading to broader security breaches or data exposure. The lack of known exploits in the wild suggests limited immediate threat, but the high CVSS score and ease of exploitation warrant urgent remediation to prevent future attacks.
Mitigation Recommendations
To mitigate CVE-2025-61779, European organizations should immediately upgrade the Confidential Containers Trustee component to version 0.15.0 or later, where the authentication checks on the attestation-policy endpoint have been implemented. Additionally, organizations should audit existing attestation policies to detect any unauthorized or suspicious changes that may have occurred prior to patching. Implement network segmentation and access controls to restrict which clients can communicate with the Trustee service, limiting exposure to untrusted kbs-clients. Employ monitoring and alerting on attestation-policy changes to detect anomalous activity promptly. Where possible, integrate multi-factor authentication or stronger client authentication mechanisms for kbs-clients interacting with the Trustee. Regularly review and update security policies governing confidential computing environments to ensure adherence to best practices. Finally, maintain awareness of updates from the Confidential Containers project and apply security patches promptly.
Affected Countries
Germany, France, Netherlands, United Kingdom, Sweden, Finland
CVE-2025-61779: CWE-639: Authorization Bypass Through User-Controlled Key in confidential-containers trustee
Description
Confidential Containers's Trustee project contains tools and components for attesting confidential guests and providing secrets to them. In versions prior to 0.15.0, the attestation-policy endpoint didn't check if the kbs-client submitting the request was actually authenticated (had the right key). This allowed any kbs-client to actually change the attestation policy. Version 0.15.0 fixes the issue.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-61779 affects the Confidential Containers Trustee project, a component responsible for attesting confidential guests and securely providing secrets to them. Specifically, in versions prior to 0.15.0, the attestation-policy endpoint failed to verify whether the requesting kbs-client was authenticated and authorized to make changes. This lack of authentication checks means that any kbs-client, including unauthenticated or malicious clients, could submit requests to alter the attestation policy. Attestation policies are critical because they define the criteria under which confidential guests are trusted and granted access to secrets. Unauthorized modification of these policies can undermine the entire security model of confidential containers, potentially allowing malicious guests to bypass security controls or gain unauthorized access to sensitive secrets. The vulnerability is classified under CWE-639 (Authorization Bypass Through User-Controlled Key), highlighting that the flaw arises from improper authorization checks. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N) indicates that the vulnerability is remotely exploitable over the network without any authentication or user interaction, with low attack complexity and a high impact on integrity. Although no known exploits are currently reported in the wild, the severity and ease of exploitation make it a critical threat. The issue was addressed in version 0.15.0 of the Trustee project, which introduced proper authentication checks on the attestation-policy endpoint to ensure only authorized kbs-clients can modify policies. Organizations using affected versions should prioritize upgrading and reviewing their attestation policies for unauthorized changes.
Potential Impact
For European organizations, the impact of CVE-2025-61779 is significant, particularly for those leveraging confidential computing environments that depend on the Confidential Containers Trustee for secure attestation and secret management. Unauthorized modification of attestation policies can lead to compromised integrity of the attestation process, allowing malicious actors to bypass security controls, potentially access sensitive secrets, or deploy untrusted workloads within supposedly secure environments. This undermines trust in confidential computing deployments, which are increasingly adopted in sectors such as finance, healthcare, and government across Europe. The vulnerability's network-exploitable nature means attackers can remotely target affected systems without prior access or user interaction, increasing the risk of widespread exploitation. Although confidentiality impact is indirect, the integrity and availability of secure attestation services are at risk, potentially leading to broader security breaches or data exposure. The lack of known exploits in the wild suggests limited immediate threat, but the high CVSS score and ease of exploitation warrant urgent remediation to prevent future attacks.
Mitigation Recommendations
To mitigate CVE-2025-61779, European organizations should immediately upgrade the Confidential Containers Trustee component to version 0.15.0 or later, where the authentication checks on the attestation-policy endpoint have been implemented. Additionally, organizations should audit existing attestation policies to detect any unauthorized or suspicious changes that may have occurred prior to patching. Implement network segmentation and access controls to restrict which clients can communicate with the Trustee service, limiting exposure to untrusted kbs-clients. Employ monitoring and alerting on attestation-policy changes to detect anomalous activity promptly. Where possible, integrate multi-factor authentication or stronger client authentication mechanisms for kbs-clients interacting with the Trustee. Regularly review and update security policies governing confidential computing environments to ensure adherence to best practices. Finally, maintain awareness of updates from the Confidential Containers project and apply security patches promptly.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-30T19:43:49.901Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68e8243cba0e608b4facfb43
Added to database: 10/9/2025, 9:08:12 PM
Last enriched: 10/9/2025, 9:22:55 PM
Last updated: 10/11/2025, 11:51:06 AM
Views: 20
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11597: SQL Injection in code-projects E-Commerce Website
MediumCVE-2025-11596: SQL Injection in code-projects E-Commerce Website
MediumCVE-2025-58301: CWE-121 Stack-based Buffer Overflow in Huawei HarmonyOS
MediumCVE-2025-58293: CWE-264 Permissions, Privileges, and Access Controls in Huawei HarmonyOS
MediumCVE-2025-58289: CWE-840 Business Logic Errors in Huawei HarmonyOS
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.