← Back to CVEs
CVE-2020-15163
HIGH8.7
Description
Python TUF (The Update Framework) reference implementation before version 0.12 it will incorrectly trust a previously downloaded root metadata file which failed verification at download time. This allows an attacker who is able to serve multiple new versions of root metadata (i.e. by a person-in-the-middle attack) culminating in a version which has not been correctly signed to control the trust chain for future updates. This is fixed in version 0.12 and newer.
CVE Details
CVSS v3.1 Score8.7
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionREQUIRED
Published9/9/2020
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
linuxfoundation:the_update_framework
Weaknesses (CWE)
CWE-863CWE-345
References
https://github.com/theupdateframework/tuf/commit/3d342e648fbacdf43a13d7ba8886aaaf07334af7(security-advisories@github.com)
https://github.com/theupdateframework/tuf/pull/885(security-advisories@github.com)
https://github.com/theupdateframework/tuf/releases/tag/v0.12.0(security-advisories@github.com)
https://github.com/theupdateframework/tuf/security/advisories/GHSA-f8mr-jv2c-v8mg(security-advisories@github.com)
https://pypi.org/project/tuf(security-advisories@github.com)
https://github.com/theupdateframework/tuf/commit/3d342e648fbacdf43a13d7ba8886aaaf07334af7(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/theupdateframework/tuf/pull/885(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/theupdateframework/tuf/releases/tag/v0.12.0(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/theupdateframework/tuf/security/advisories/GHSA-f8mr-jv2c-v8mg(af854a3a-2127-422b-91ae-364da2661108)
https://pypi.org/project/tuf(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.