Duplicate Advisory: Keylime Missing Authentication for Critical Function and Improper Authentication
Critical severity
GitHub Reviewed
Published
Feb 6, 2026
to the GitHub Advisory Database
•
Updated Feb 9, 2026
Withdrawn
This advisory was withdrawn on Feb 6, 2026
Description
Published by the National Vulnerability Database
Feb 6, 2026
Published to the GitHub Advisory Database
Feb 6, 2026
Reviewed
Feb 6, 2026
Withdrawn
Feb 6, 2026
Last updated
Feb 9, 2026
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-4jqp-9qjv-57m2. This link is maintained to preserve external references.
Original Description
A flaw was found in Keylime. The Keylime registrar, since version 7.12.0, does not enforce client-side Transport Layer Security (TLS) authentication. This authentication bypass vulnerability allows unauthenticated clients with network access to perform administrative operations, including listing agents, retrieving public Trusted Platform Module (TPM) data, and deleting agents, by connecting without presenting a client certificate.
References