Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64186: CWE-347: Improper Verification of Cryptographic Signature in evervault evervault-go

0
High
VulnerabilityCVE-2025-64186cvecve-2025-64186cwe-347
Published: Wed Nov 12 2025 (11/12/2025, 20:34:04 UTC)
Source: CVE Database V5
Vendor/Project: evervault
Product: evervault-go

Description

Evervault is a payment security solution. A vulnerability was identified in the `evervault-go` SDK’s attestation verification logic in versions of `evervault-go` prior to 1.3.2 that may allow incomplete documents to pass validation. This may cause the client to trust an enclave operator that does not meet expected integrity guarantees. The exploitability of this issue is limited in Evervault-hosted environments as an attacker would require the pre-requisite ability to serve requests from specific evervault domain names, following from our ACME challenge based TLS certificate acquisition pipeline. The vulnerability primarily affects applications which only check PCR8. Though the efficacy is also reduced for applications that check all PCR values, the impact is largely remediated by checking PCR 0, 1 and 2. The identified issue has been addressed in version 1.3.2 by validating attestation documents before storing in the cache, and replacing the naive equality checks with a new SatisfiedBy check. Those who useevervault-go to attest Enclaves that are hosted outside of Evervault environments and cannot upgrade have two possible workarounds available. Modify the application logic to fail verification if PCR8 is not explicitly present and non-empty and/or add custom pre-validation to reject documents that omit any required PCRs.

AI-Powered Analysis

AILast updated: 11/12/2025, 20:47:51 UTC

Technical Analysis

CVE-2025-64186 is a vulnerability classified under CWE-347 (Improper Verification of Cryptographic Signature) affecting the evervault-go SDK, a component used for secure enclave attestation in Evervault's payment security solution. The flaw lies in the attestation verification logic prior to version 1.3.2, where incomplete attestation documents—specifically those missing or improperly validating PCR (Platform Configuration Register) values—could be accepted as valid. This improper validation primarily affects applications that only check PCR8, a specific register used to verify enclave integrity, allowing an attacker to bypass expected integrity guarantees and potentially trust malicious enclave operators. The vulnerability is mitigated in Evervault-hosted environments due to the requirement that attackers must be able to serve requests from specific evervault domain names, which are protected by ACME challenge-based TLS certificate issuance, raising the bar for exploitation. The patch in version 1.3.2 introduces validation of attestation documents before caching and replaces naive equality checks with a more robust SatisfiedBy check, ensuring all required PCRs are present and valid. For users hosting enclaves outside Evervault environments who cannot upgrade, recommended workarounds include modifying application logic to reject attestation documents lacking PCR8 or any required PCRs and implementing custom pre-validation steps. The vulnerability has a CVSS v3.1 score of 8.7, indicating high severity due to its impact on confidentiality and integrity, the complexity of exploitation being low if prerequisites are met, and the scope affecting all applications using vulnerable versions of evervault-go.

Potential Impact

For European organizations using the evervault-go SDK, especially in payment processing or secure enclave attestation, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive data. If exploited, attackers could cause clients to trust compromised or malicious enclave operators, potentially leading to unauthorized data access or manipulation within supposedly secure enclaves. This undermines the core security guarantees of enclave-based protections, which are critical in financial and regulated sectors prevalent in Europe. The impact is particularly severe for organizations hosting enclaves outside Evervault's managed environments, where the exploitability is higher. Given the high CVSS score and the critical role of enclave attestation in secure payment solutions, exploitation could lead to data breaches, regulatory non-compliance (e.g., GDPR violations), financial losses, and reputational damage. However, the requirement for attackers to serve requests from specific evervault domains limits widespread exploitation, somewhat reducing immediate risk in Evervault-hosted environments.

Mitigation Recommendations

European organizations should immediately upgrade to evervault-go version 1.3.2 or later to benefit from the patched attestation verification logic. For those unable to upgrade promptly, especially when hosting enclaves outside Evervault environments, it is crucial to implement strict application-level validation by rejecting attestation documents missing PCR8 or any other required PCRs. Custom pre-validation logic should be added to ensure completeness and integrity of attestation data before acceptance or caching. Network controls should be enforced to restrict access to evervault domain names and monitor for anomalous requests that could indicate exploitation attempts. Additionally, organizations should audit their enclave attestation configurations to ensure multiple PCRs (including PCR0, PCR1, and PCR2) are checked rather than relying solely on PCR8. Regular security assessments and monitoring for unusual enclave behavior or certificate issuance anomalies are recommended. Finally, integrating these mitigations into secure software development lifecycle (SDLC) processes will help prevent recurrence.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-28T21:07:16.440Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6914f08607da5f027f55f1c6

Added to database: 11/12/2025, 8:39:34 PM

Last enriched: 11/12/2025, 8:47:51 PM

Last updated: 11/12/2025, 9:47:08 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats