Description


Python TUF (The Update Framework) reference implementation before version 0.12 it will incorrectly trust a previously downloaded root metadata file which failed verification at download time. This allows an attacker who is able to serve multiple new versions of root metadata (i.e. by a person-in-the-middle attack) culminating in a version which has not been correctly signed to control the trust chain for future updates. This is fixed in version 0.12 and newer.

Weaknesses



CWE-863


CWE-345

CVSS impact metrics


CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N

8.7 · High

Information


Source identifier

[email protected]

Vulnerability status

Modified

Published

2020-09-09T16:15:22.480Z

5 years ago

Last modified

2024-11-21T04:04:58.837Z

1 year ago