CVE-2025-64186: CWE-347: Improper Verification of Cryptographic Signature in evervault evervault-go
Evervault is a payment security solution. A vulnerability was identified in the `evervault-go` SDK’s attestation verification logic in versions of `evervault-go` prior to 1.3.2 that may allow incomplete documents to pass validation. This may cause the client to trust an enclave operator that does not meet expected integrity guarantees. The exploitability of this issue is limited in Evervault-hosted environments as an attacker would require the pre-requisite ability to serve requests from specific evervault domain names, following from our ACME challenge based TLS certificate acquisition pipeline. The vulnerability primarily affects applications which only check PCR8. Though the efficacy is also reduced for applications that check all PCR values, the impact is largely remediated by checking PCR 0, 1 and 2. The identified issue has been addressed in version 1.3.2 by validating attestation documents before storing in the cache, and replacing the naive equality checks with a new SatisfiedBy check. Those who useevervault-go to attest Enclaves that are hosted outside of Evervault environments and cannot upgrade have two possible workarounds available. Modify the application logic to fail verification if PCR8 is not explicitly present and non-empty and/or add custom pre-validation to reject documents that omit any required PCRs.
AI Analysis
Technical Summary
CVE-2025-64186 is a vulnerability classified under CWE-347 (Improper Verification of Cryptographic Signature) affecting the evervault-go SDK, a component used for secure enclave attestation in Evervault's payment security solution. The flaw lies in the attestation verification logic prior to version 1.3.2, where incomplete attestation documents—specifically those missing or improperly validating PCR (Platform Configuration Register) values—could be accepted as valid. This improper validation primarily affects applications that only check PCR8, a specific register used to verify enclave integrity, allowing an attacker to bypass expected integrity guarantees and potentially trust malicious enclave operators. The vulnerability is mitigated in Evervault-hosted environments due to the requirement that attackers must be able to serve requests from specific evervault domain names, which are protected by ACME challenge-based TLS certificate issuance, raising the bar for exploitation. The patch in version 1.3.2 introduces validation of attestation documents before caching and replaces naive equality checks with a more robust SatisfiedBy check, ensuring all required PCRs are present and valid. For users hosting enclaves outside Evervault environments who cannot upgrade, recommended workarounds include modifying application logic to reject attestation documents lacking PCR8 or any required PCRs and implementing custom pre-validation steps. The vulnerability has a CVSS v3.1 score of 8.7, indicating high severity due to its impact on confidentiality and integrity, the complexity of exploitation being low if prerequisites are met, and the scope affecting all applications using vulnerable versions of evervault-go.
Potential Impact
For European organizations using the evervault-go SDK, especially in payment processing or secure enclave attestation, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive data. If exploited, attackers could cause clients to trust compromised or malicious enclave operators, potentially leading to unauthorized data access or manipulation within supposedly secure enclaves. This undermines the core security guarantees of enclave-based protections, which are critical in financial and regulated sectors prevalent in Europe. The impact is particularly severe for organizations hosting enclaves outside Evervault's managed environments, where the exploitability is higher. Given the high CVSS score and the critical role of enclave attestation in secure payment solutions, exploitation could lead to data breaches, regulatory non-compliance (e.g., GDPR violations), financial losses, and reputational damage. However, the requirement for attackers to serve requests from specific evervault domains limits widespread exploitation, somewhat reducing immediate risk in Evervault-hosted environments.
Mitigation Recommendations
European organizations should immediately upgrade to evervault-go version 1.3.2 or later to benefit from the patched attestation verification logic. For those unable to upgrade promptly, especially when hosting enclaves outside Evervault environments, it is crucial to implement strict application-level validation by rejecting attestation documents missing PCR8 or any other required PCRs. Custom pre-validation logic should be added to ensure completeness and integrity of attestation data before acceptance or caching. Network controls should be enforced to restrict access to evervault domain names and monitor for anomalous requests that could indicate exploitation attempts. Additionally, organizations should audit their enclave attestation configurations to ensure multiple PCRs (including PCR0, PCR1, and PCR2) are checked rather than relying solely on PCR8. Regular security assessments and monitoring for unusual enclave behavior or certificate issuance anomalies are recommended. Finally, integrating these mitigations into secure software development lifecycle (SDLC) processes will help prevent recurrence.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Ireland, Belgium
CVE-2025-64186: CWE-347: Improper Verification of Cryptographic Signature in evervault evervault-go
Description
Evervault is a payment security solution. A vulnerability was identified in the `evervault-go` SDK’s attestation verification logic in versions of `evervault-go` prior to 1.3.2 that may allow incomplete documents to pass validation. This may cause the client to trust an enclave operator that does not meet expected integrity guarantees. The exploitability of this issue is limited in Evervault-hosted environments as an attacker would require the pre-requisite ability to serve requests from specific evervault domain names, following from our ACME challenge based TLS certificate acquisition pipeline. The vulnerability primarily affects applications which only check PCR8. Though the efficacy is also reduced for applications that check all PCR values, the impact is largely remediated by checking PCR 0, 1 and 2. The identified issue has been addressed in version 1.3.2 by validating attestation documents before storing in the cache, and replacing the naive equality checks with a new SatisfiedBy check. Those who useevervault-go to attest Enclaves that are hosted outside of Evervault environments and cannot upgrade have two possible workarounds available. Modify the application logic to fail verification if PCR8 is not explicitly present and non-empty and/or add custom pre-validation to reject documents that omit any required PCRs.
AI-Powered Analysis
Technical Analysis
CVE-2025-64186 is a vulnerability classified under CWE-347 (Improper Verification of Cryptographic Signature) affecting the evervault-go SDK, a component used for secure enclave attestation in Evervault's payment security solution. The flaw lies in the attestation verification logic prior to version 1.3.2, where incomplete attestation documents—specifically those missing or improperly validating PCR (Platform Configuration Register) values—could be accepted as valid. This improper validation primarily affects applications that only check PCR8, a specific register used to verify enclave integrity, allowing an attacker to bypass expected integrity guarantees and potentially trust malicious enclave operators. The vulnerability is mitigated in Evervault-hosted environments due to the requirement that attackers must be able to serve requests from specific evervault domain names, which are protected by ACME challenge-based TLS certificate issuance, raising the bar for exploitation. The patch in version 1.3.2 introduces validation of attestation documents before caching and replaces naive equality checks with a more robust SatisfiedBy check, ensuring all required PCRs are present and valid. For users hosting enclaves outside Evervault environments who cannot upgrade, recommended workarounds include modifying application logic to reject attestation documents lacking PCR8 or any required PCRs and implementing custom pre-validation steps. The vulnerability has a CVSS v3.1 score of 8.7, indicating high severity due to its impact on confidentiality and integrity, the complexity of exploitation being low if prerequisites are met, and the scope affecting all applications using vulnerable versions of evervault-go.
Potential Impact
For European organizations using the evervault-go SDK, especially in payment processing or secure enclave attestation, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive data. If exploited, attackers could cause clients to trust compromised or malicious enclave operators, potentially leading to unauthorized data access or manipulation within supposedly secure enclaves. This undermines the core security guarantees of enclave-based protections, which are critical in financial and regulated sectors prevalent in Europe. The impact is particularly severe for organizations hosting enclaves outside Evervault's managed environments, where the exploitability is higher. Given the high CVSS score and the critical role of enclave attestation in secure payment solutions, exploitation could lead to data breaches, regulatory non-compliance (e.g., GDPR violations), financial losses, and reputational damage. However, the requirement for attackers to serve requests from specific evervault domains limits widespread exploitation, somewhat reducing immediate risk in Evervault-hosted environments.
Mitigation Recommendations
European organizations should immediately upgrade to evervault-go version 1.3.2 or later to benefit from the patched attestation verification logic. For those unable to upgrade promptly, especially when hosting enclaves outside Evervault environments, it is crucial to implement strict application-level validation by rejecting attestation documents missing PCR8 or any other required PCRs. Custom pre-validation logic should be added to ensure completeness and integrity of attestation data before acceptance or caching. Network controls should be enforced to restrict access to evervault domain names and monitor for anomalous requests that could indicate exploitation attempts. Additionally, organizations should audit their enclave attestation configurations to ensure multiple PCRs (including PCR0, PCR1, and PCR2) are checked rather than relying solely on PCR8. Regular security assessments and monitoring for unusual enclave behavior or certificate issuance anomalies are recommended. Finally, integrating these mitigations into secure software development lifecycle (SDLC) processes will help prevent recurrence.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-10-28T21:07:16.440Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6914f08607da5f027f55f1c6
Added to database: 11/12/2025, 8:39:34 PM
Last enriched: 11/12/2025, 8:47:51 PM
Last updated: 11/12/2025, 9:47:08 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64482: CWE-352: Cross-Site Request Forgery (CSRF) in Enalean tuleap
MediumCVE-2025-33119: CWE-260 Password in Configuration File in IBM QRadar Security Information and Event Management
MediumCVE-2025-64345: CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in bytecodealliance wasmtime
LowCVE-2025-63645: n/a
UnknownCVE-2024-48709: n/a
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.