Use of Predictable Algorithm in Random Number Generator Affecting keylime package, versions [7.14.0,7.14.2)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.02% (4th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Use of Predictable Algorithm in Random Number Generator vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-KEYLIME-16428641
  • published6 May 2026
  • disclosed6 May 2026
  • creditUnknown

Introduced: 6 May 2026

NewCVE-2026-6420  (opens in a new tab)
CWE-1241  (opens in a new tab)

How to fix?

Upgrade keylime to version 7.14.2 or higher.

Overview

keylime is a TPM-based key bootstrapping and system integrity measurement system for cloud

Affected versions of this package are vulnerable to Use of Predictable Algorithm in Random Number Generator in the generate_challenge() method. An attacker can evade detection and bypass security controls by replaying previously captured TPM quotes due to the use of a hardcoded nonce value. This is only exploitable if the deployment is configured in push model mode.

Workaround

This vulnerability can be mitigated by enabling the TPM clock monotonicity check, which limits each quote to a single replay, and by using the push attestation timeout to constrain the quote generation window.

CVSS Base Scores

version 4.0
version 3.1