keylime CVE Vulnerabilities & Metrics

Focus on keylime vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About keylime Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with keylime. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total keylime CVEs: 12
Earliest CVE date: 25 Feb 2021, 20:15 UTC
Latest CVE date: 25 Aug 2023, 17:15 UTC

Latest CVE reference: CVE-2023-38201

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -100.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -100.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical keylime CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 1.16

Max CVSS: 7.5

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 10
4.0-6.9 1
7.0-8.9 1
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS keylime CVEs

These are the five CVEs with the highest CVSS scores for keylime, sorted by severity first and recency.

All CVEs for keylime

CVE-2023-38201 keylime vulnerability CVSS: 0 25 Aug 2023, 17:15 UTC

A flaw was found in the Keylime registrar that could allow a bypass of the challenge-response protocol during agent registration. This issue may allow an attacker to impersonate an agent and hide the true status of a monitored machine if the fake agent is added to the verifier list by a legitimate user, resulting in a breach of the integrity of the registrar database.

CVE-2023-38200 keylime vulnerability CVSS: 0 24 Jul 2023, 16:15 UTC

A flaw was found in Keylime. Due to their blocking nature, the Keylime registrar is subject to a remote denial of service against its SSL connections. This flaw allows an attacker to exhaust all available connections.

CVE-2023-3674 keylime vulnerability CVSS: 0 19 Jul 2023, 19:15 UTC

A flaw was found in the keylime attestation verifier, which fails to flag a device's submitted TPM quote as faulty when the quote's signature does not validate for some reason. Instead, it will only emit an error in the log without flagging the device as untrusted.

CVE-2022-3500 keylime vulnerability CVSS: 0 22 Nov 2022, 19:15 UTC

A vulnerability was found in keylime. This security issue happens in some circumstances, due to some improperly handled exceptions, there exists the possibility that a rogue agent could create errors on the verifier that stopped attestation attempts for that host leaving it in an attested state but not verifying that anymore.

CVE-2022-23952 keylime vulnerability CVSS: 0 21 Sep 2022, 19:15 UTC

In Keylime before 6.3.0, current keylime installer installs the keylime.conf file, which can contain sensitive data, as world-readable.

CVE-2022-23951 keylime vulnerability CVSS: 0 21 Sep 2022, 19:15 UTC

In Keylime before 6.3.0, quote responses from the agent can contain possibly untrusted ZIP data which can lead to zip bombs.

CVE-2022-23950 keylime vulnerability CVSS: 0 21 Sep 2022, 19:15 UTC

In Keylime before 6.3.0, Revocation Notifier uses a fixed /tmp path for UNIX domain socket which can allow unprivileged users a method to prohibit keylime operations.

CVE-2022-23949 keylime vulnerability CVSS: 0 21 Sep 2022, 19:15 UTC

In Keylime before 6.3.0, unsanitized UUIDs can be passed by a rogue agent and can lead to log spoofing on the verifier and registrar.

CVE-2022-23948 keylime vulnerability CVSS: 0 21 Sep 2022, 19:15 UTC

A flaw was found in Keylime before 6.3.0. The logic in the Keylime agent for checking for a secure mount can be fooled by previously created unprivileged mounts allowing secrets to be leaked to other processes on the host.

CVE-2021-43310 keylime vulnerability CVSS: 0 21 Sep 2022, 19:15 UTC

A vulnerability in Keylime before 6.3.0 allows an attacker to craft a request to the agent that resets the U and V keys as if the agent were being re-added to a verifier. This could lead to a remote code execution.

CVE-2022-1053 keylime vulnerability CVSS: 6.4 06 May 2022, 17:15 UTC

Keylime does not enforce that the agent registrar data is the same when the tenant uses it for validation of the EK and identity quote and the verifier for validating the integrity quote. This allows an attacker to use one AK, EK pair from a real TPM to pass EK validation and give the verifier an AK of a software TPM. A successful attack breaks the entire chain of trust because a not validated AK is used by the verifier. This issue is worse if the validation happens first and then the agent gets added to the verifier because the timing is easier and the verifier does not validate the regcount entry being equal to 1,

CVE-2021-3406 keylime vulnerability CVSS: 7.5 25 Feb 2021, 20:15 UTC

A flaw was found in keylime 5.8.1 and older. The issue in the Keylime agent and registrar code invalidates the cryptographic chain of trust from the Endorsement Key certificate to agent attestations.