CVE-2020-15093
Improper verification of signature threshold in tough
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The tough library (Rust/crates.io) prior to version 0.7.1 does not properly verify the threshold of cryptographic signatures. It allows an attacker to duplicate a valid signature in order to circumvent TUF requiring a minimum threshold of unique signatures before the metadata is considered valid. A fix is available in version 0.7.1. CVE-2020-6174 is assigned to the same vulnerability in the TUF reference implementation.
La biblioteca tough (Rust/crates.io) anterior a la versión 0.7.1, no verifica apropiadamente el umbral de firmas criptográficas. Permite a un atacante duplicar una firma válida a fin de eludir TUF que requiere un umbral mínimo de firmas únicas antes de que los metadatos se consideraran válidos. Una corrección está disponible en la versión 0.7.1. El CVE-2020-6174 es asignado a la misma vulnerabilidad en la implementación de la referencia TUF
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-06-25 CVE Reserved
- 2020-07-09 CVE Published
- 2024-05-13 EPSS Updated
- 2024-08-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-347: Improper Verification of Cryptographic Signature
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://crates.io/crates/tough | Third Party Advisory | |
https://github.com/awslabs/tough/security/advisories/GHSA-5q2r-92f9-4m49 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/theupdateframework/tuf/commit/2977188139d065ff3356c3cb4aec60c582b57e0e | 2021-10-26 | |
https://github.com/theupdateframework/tuf/pull/974 | 2021-10-26 |
URL | Date | SRC |
---|