Information Exposure Affecting github.com/edgelesssys/constellation/v2/internal/attestation package, versions <2.5.2


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMEDGELESSSYSCONSTELLATIONV2INTERNALATTESTATION-3325578
  • published19 Feb 2023
  • disclosed17 Feb 2023
  • creditUnknown

Introduced: 17 Feb 2023

CVE NOT AVAILABLE CWE-200  (opens in a new tab)

How to fix?

Upgrade github.com/edgelesssys/constellation/v2/internal/attestation to version 2.5.2 or higher.

Overview

Affected versions of this package are vulnerable to Information Exposure allowing an attacker to intercept a node initialization, initialize the node themselves, and then impersonate an uninitialized node to the validator. This is because attestation user data (such as the digest of the public key in an aTLS connection) is bound to the issuer's TPM, but not to its PCR state.

References

CVSS Scores

version 3.1