CVE-2026-1709

critical

Description

A flaw was found in Keylime. The Keylime registrar, since version 7.12.0, does not enforce client-side Transport Layer Security (TLS) authentication. This authentication bypass vulnerability allows unauthenticated clients with network access to perform administrative operations, including listing agents, retrieving public Trusted Platform Module (TPM) data, and deleting agents, by connecting without presenting a client certificate.

References

https://bugzilla.redhat.com/show_bug.cgi?id=2435514

https://access.redhat.com/security/cve/CVE-2026-1709

Details

Source: Mitre, NVD

Published: 2026-02-06

Updated: 2026-02-06

Risk Information

CVSS v2

Base Score: 9.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:C/A:C

Severity: High

CVSS v3

Base Score: 9.4

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H

Severity: Critical

EPSS

EPSS: 0.00043