Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64186: CWE-347: Improper Verification of Cryptographic Signature in evervault evervault-go

0
High
VulnerabilityCVE-2025-64186cvecve-2025-64186cwe-347
Published: Wed Nov 12 2025 (11/12/2025, 20:34:04 UTC)
Source: CVE Database V5
Vendor/Project: evervault
Product: evervault-go

Description

Evervault is a payment security solution. A vulnerability was identified in the `evervault-go` SDK’s attestation verification logic in versions of `evervault-go` prior to 1.3.2 that may allow incomplete documents to pass validation. This may cause the client to trust an enclave operator that does not meet expected integrity guarantees. The exploitability of this issue is limited in Evervault-hosted environments as an attacker would require the pre-requisite ability to serve requests from specific evervault domain names, following from our ACME challenge based TLS certificate acquisition pipeline. The vulnerability primarily affects applications which only check PCR8. Though the efficacy is also reduced for applications that check all PCR values, the impact is largely remediated by checking PCR 0, 1 and 2. The identified issue has been addressed in version 1.3.2 by validating attestation documents before storing in the cache, and replacing the naive equality checks with a new SatisfiedBy check. Those who useevervault-go to attest Enclaves that are hosted outside of Evervault environments and cannot upgrade have two possible workarounds available. Modify the application logic to fail verification if PCR8 is not explicitly present and non-empty and/or add custom pre-validation to reject documents that omit any required PCRs.

AI-Powered Analysis

AILast updated: 11/19/2025, 21:14:14 UTC

Technical Analysis

CVE-2025-64186 is a vulnerability identified in the evervault-go SDK, a component used for enclave attestation in Evervault's payment security solution. The flaw stems from improper verification of cryptographic signatures in attestation documents, specifically allowing incomplete or malformed documents to pass validation. This occurs primarily because applications relying solely on PCR8 (Platform Configuration Register 8) for attestation verification may accept documents missing critical integrity checks. PCRs are used in Trusted Platform Module (TPM) and enclave attestation to ensure the integrity of the platform and software environment. The vulnerability could lead to clients trusting enclave operators that do not meet expected security guarantees, potentially exposing sensitive payment data or cryptographic operations to malicious actors. Exploitation is constrained by the requirement that attackers must be able to serve requests from specific evervault domain names, tied to the ACME challenge-based TLS certificate issuance process, which limits the attack surface primarily to non-Evervault-hosted environments. The vulnerability is mitigated by verifying multiple PCR values (PCR0, 1, and 2) alongside PCR8, which reduces the risk of incomplete attestation acceptance. The fix introduced in version 1.3.2 includes validating attestation documents before caching and replacing naive equality checks with a more sophisticated SatisfiedBy check to ensure completeness and correctness of attestation data. For users unable to upgrade, especially those hosting enclaves outside Evervault environments, recommended workarounds involve modifying application logic to reject attestation documents missing or having empty PCR8 values and implementing custom pre-validation to enforce the presence of all required PCRs. The vulnerability is classified under CWE-347 (Improper Verification of Cryptographic Signature) and has a CVSS v3.1 score of 8.7, indicating high severity due to its impact on confidentiality and integrity without requiring user interaction but requiring high privileges to exploit.

Potential Impact

For European organizations, particularly those in the financial technology and payment processing sectors that use Evervault's evervault-go SDK for enclave attestation, this vulnerability poses a significant risk. Exploitation could allow attackers to bypass critical integrity checks, leading to unauthorized trust in compromised or malicious enclave operators. This could result in exposure or manipulation of sensitive payment data, undermining confidentiality and integrity of transactions. Given the high CVSS score and the critical role of enclave attestation in securing cryptographic operations, the impact includes potential data breaches, regulatory non-compliance (e.g., GDPR), financial losses, and reputational damage. The limited exploitability in Evervault-hosted environments reduces risk for many users; however, organizations hosting enclaves independently or using customized deployments are at higher risk. The vulnerability's exploitation could also affect supply chain trust and the security of cryptographic key management, which are vital for secure payment ecosystems prevalent in Europe. The lack of known exploits in the wild currently provides some mitigation window, but proactive patching and validation are essential to prevent future attacks.

Mitigation Recommendations

European organizations should immediately upgrade all instances of evervault-go SDK to version 1.3.2 or later to benefit from the official fix. For environments where upgrading is not feasible, especially those hosting enclaves outside Evervault infrastructure, implement strict application-level validation to reject attestation documents missing PCR8 or any required PCR values. Modify attestation verification logic to enforce explicit presence and non-emptiness of PCR8 and consider adding custom pre-validation layers to ensure completeness of attestation data before caching or trusting it. Additionally, restrict network access and domain name permissions to prevent unauthorized entities from serving requests from evervault domain names, thereby reducing the attack surface. Conduct thorough audits of enclave attestation processes and logs to detect anomalies or incomplete attestations. Incorporate continuous monitoring for updates from Evervault and related security advisories. Finally, integrate these mitigations into secure software development lifecycle (SDLC) practices and incident response plans to ensure rapid response to any exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-28T21:07:16.440Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6914f08607da5f027f55f1c6

Added to database: 11/12/2025, 8:39:34 PM

Last enriched: 11/19/2025, 9:14:14 PM

Last updated: 12/28/2025, 1:22:29 AM

Views: 84

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats