CVE-2025-13609: Keylime allows users to register new agents by recycling existing UUIDs when using different TPM devices
(updated )
A vulnerability has been identified in keylime where an attacker can exploit this flaw by registering a new agent using a different Trusted Platform Module (TPM) device but claiming an existing agent’s unique identifier (UUID). This action overwrites the legitimate agent’s identity, enabling the attacker to impersonate the compromised agent and potentially bypass security controls.
References
- access.redhat.com/security/cve/CVE-2025-13609
- bugzilla.redhat.com/show_bug.cgi?id=2416761
- github.com/advisories/GHSA-xh5w-g8gq-r3v9
- github.com/keylime/keylime
- github.com/keylime/keylime/commit/e1ae8de1f7b1385eaeec66572a92ff1338e6e157
- github.com/keylime/keylime/pull/1785
- github.com/keylime/keylime/releases/tag/v7.13.0
- nvd.nist.gov/vuln/detail/CVE-2025-13609
Code Behaviors & Features
Detect and mitigate CVE-2025-13609 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →