← Retour aux CVEs
CVE-2026-6966
MEDIUM5.3
Description
Improper verification of cryptographic signature uniqueness in delegated role validation in awslabs/tough before tough-v0.22.0 allows remote authenticated users to bypass the TUF signature threshold requirement by duplicating a valid signature, causing the client to accept forged delegated role metadata. We recommend you upgrade to tough-v0.22.0 / tuftool-v0.15.0.
Details CVE
Score CVSS v3.15.3
SeveriteMEDIUM
Vecteur CVSSCVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
Vecteur d'attaqueNETWORK
ComplexiteHIGH
Privileges requisLOW
Interaction utilisateurNONE
Publie4/24/2026
Derniere modification4/24/2026
Sourcenvd
Observations honeypot0
Faiblesses (CWE)
CWE-347
References
https://aws.amazon.com/security/security-bulletins/2026-019-aws/(ff89ba41-3aa1-4d27-914a-91399e9639e5)
https://crates.io/crates/tough/0.22.0(ff89ba41-3aa1-4d27-914a-91399e9639e5)
https://crates.io/crates/tuftool/0.15.0(ff89ba41-3aa1-4d27-914a-91399e9639e5)
https://github.com/awslabs/tough/releases/tag/tough-v0.22.0(ff89ba41-3aa1-4d27-914a-91399e9639e5)
https://github.com/awslabs/tough/releases/tag/tuftool-v0.15.0(ff89ba41-3aa1-4d27-914a-91399e9639e5)
https://github.com/awslabs/tough/security/advisories/GHSA-8m7c-8m39-rv4x(ff89ba41-3aa1-4d27-914a-91399e9639e5)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.