CVE-2026-6420
Received Received - Intake
Keylime TPM Quote Replay Vulnerability in Push Model

Publication date: 2026-05-06

Last updated on: 2026-05-06

Assigner: Red Hat, Inc.

Description
A flaw was found in Keylime. An attacker with root access on an enrolled monitored machine, where the Keylime agent runs, can exploit a vulnerability in the Keylime verifier. The verifier uses a hardcoded challenge nonce for Trusted Platform Module (TPM) quote attestation instead of a cryptographically random value. This allows the attacker to stockpile valid TPM quotes and replay them to evade detection after compromising the system. This issue affects only the push model deployment.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-06
Last Modified
2026-05-06
Generated
2026-05-07
AI Q&A
2026-05-06
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
keylime keylime *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-1241 The device uses an algorithm that is predictable and generates a pseudo-random number.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves monitoring the behavior of the Keylime agent and verifier on enrolled monitored machines, specifically those using the push model deployment.

Since the vulnerability involves the use of a hardcoded challenge nonce for TPM quote attestation, one detection approach is to check if the Keylime verifier is using a fixed nonce rather than a cryptographically random value.

Commands to inspect the Keylime agent and verifier configuration or logs might include:

  • Checking the Keylime agent process and its status: `ps aux | grep keylime`
  • Reviewing Keylime verifier logs for repeated TPM quotes with identical nonces or suspicious replay activity: `journalctl -u keylime-verifier` or checking log files in `/var/log/keylime/`
  • Verifying the nonce value used in TPM quote attestation by inspecting the verifier source code or configuration files to confirm if a hardcoded nonce is present.

Because exploitation requires root access and involves stopping and restarting the Keylime agent within a short timeout window, monitoring for unexpected agent restarts or suspicious timing patterns may also help detect exploitation attempts.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps focus on preventing exploitation by addressing the use of the hardcoded challenge nonce in the Keylime verifier.

  • Upgrade or patch the Keylime verifier to a version that generates cryptographically random nonces for TPM quote attestation instead of using a hardcoded value.
  • If an upgrade is not immediately possible, consider disabling the push model deployment and switching to the pull model deployment, which is not affected by this vulnerability.
  • Restrict root access on enrolled monitored machines to trusted administrators only, as exploitation requires root privileges.
  • Monitor and audit Keylime agent activity to detect suspicious restarts or unusual TPM quote patterns that may indicate exploitation attempts.

Can you explain this vulnerability to me?

This vulnerability affects the Keylime verifier component, which is responsible for TPM quote attestation. Instead of using a cryptographically random challenge nonce, the verifier uses a hardcoded nonce. An attacker with root access on a monitored machine running the Keylime agent can exploit this by collecting valid TPM quotes generated with the known nonce during a short timeout window.

The attacker can then compromise the system and replay these previously collected TPM quotes to evade detection by the verifier. This issue only affects the push model deployment of Keylime, not the pull model.


How can this vulnerability impact me? :

If exploited, this vulnerability allows an attacker with root access on a monitored machine to evade detection after compromising the system. By replaying previously collected TPM quotes, the attacker can make the system appear trustworthy to the Keylime verifier even though it has been compromised.

This can lead to prolonged undetected system compromise, potentially allowing further malicious activities or data breaches.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in Keylime verifier allows an attacker with root access to replay TPM quotes to evade detection after compromising a system. This evasion of detection could potentially undermine the integrity and security controls expected by compliance standards such as GDPR and HIPAA, which require protection of system integrity and timely detection of unauthorized access or compromise.

However, the provided information does not explicitly state the direct impact on compliance with these standards or regulations.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart