← Back to CVEs
CVE-2026-6420
MEDIUM6.3
Description
A flaw was found in Keylime. An attacker with root access on an enrolled monitored machine, where the Keylime agent runs, can exploit a vulnerability in the Keylime verifier. The verifier uses a hardcoded challenge nonce for Trusted Platform Module (TPM) quote attestation instead of a cryptographically random value. This allows the attacker to stockpile valid TPM quotes and replay them to evade detection after compromising the system. This issue affects only the push model deployment.
CVE Details
CVSS v3.1 Score6.3
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredHIGH
User InteractionNONE
Published5/6/2026
Last Modified5/6/2026
Sourcenvd
Honeypot Sightings0
Weaknesses (CWE)
CWE-1241
References
https://access.redhat.com/security/cve/CVE-2026-6420(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=2458889(secalert@redhat.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.