Improper access control in keylime - CVE-2022-1053
Published: May 4, 2022 / Updated: May 7, 2026
keylime
Keylime
Description
The vulnerability allows a remote attacker to bypass TPM-based attestation validation.
The vulnerability exists due to improper access control in registrar data handling when validating the EK and identity quote and validating the integrity quote. A remote attacker can provide mismatched AK and EK data to bypass TPM-based attestation validation.
The issue can break the chain of trust because the verifier may use an AK that was not validated, and exploitation is easier when validation occurs before the agent is added to the verifier.