Vulnerability Details : CVE-2020-15163
Python TUF (The Update Framework) reference implementation before version 0.12 it will incorrectly trust a previously downloaded root metadata file which failed verification at download time. This allows an attacker who is able to serve multiple new versions of root metadata (i.e. by a person-in-the-middle attack) culminating in a version which has not been correctly signed to control the trust chain for future updates. This is fixed in version 0.12 and newer.
Products affected by CVE-2020-15163
- cpe:2.3:a:linuxfoundation:the_update_framework:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-15163
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 42 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-15163
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.9
|
MEDIUM | AV:N/AC:M/Au:S/C:P/I:P/A:N |
6.8
|
4.9
|
NIST | |
8.2
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N |
1.8
|
5.8
|
NIST | |
8.7
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N |
2.3
|
5.8
|
GitHub, Inc. |
CWE ids for CVE-2020-15163
-
The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.Assigned by: nvd@nist.gov (Primary)
-
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.Assigned by: security-advisories@github.com (Secondary)
References for CVE-2020-15163
-
https://github.com/theupdateframework/tuf/releases/tag/v0.12.0
Release tuf v0.12.0 · theupdateframework/tuf · GitHubThird Party Advisory
-
https://github.com/theupdateframework/tuf/commit/3d342e648fbacdf43a13d7ba8886aaaf07334af7
Merge pull request #885 from trishankatdatadog:trishankatdatadog/corr… · theupdateframework/tuf@3d342e6 · GitHubBroken Link
-
https://pypi.org/project/tuf
tuf · PyPIProduct;Vendor Advisory
-
https://github.com/theupdateframework/tuf/security/advisories/GHSA-f8mr-jv2c-v8mg
Invalid root may become trusted root · Advisory · theupdateframework/tuf · GitHubThird Party Advisory
-
https://github.com/theupdateframework/tuf/pull/885
Do not immediately verify latest root when rotating by trishankatdatadog · Pull Request #885 · theupdateframework/tuf · GitHubPatch;Third Party Advisory
Jump to