Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. keylime
  4. ›
  5. CVE-2025-13609

CVE-2025-13609: Keylime allows users to register new agents by recycling existing UUIDs when using different TPM devices

November 24, 2025 (updated November 26, 2025)

A vulnerability has been identified in keylime where an attacker can exploit this flaw by registering a new agent using a different Trusted Platform Module (TPM) device but claiming an existing agent’s unique identifier (UUID). This action overwrites the legitimate agent’s identity, enabling the attacker to impersonate the compromised agent and potentially bypass security controls.

References

  • access.redhat.com/security/cve/CVE-2025-13609
  • bugzilla.redhat.com/show_bug.cgi?id=2416761
  • github.com/advisories/GHSA-xh5w-g8gq-r3v9
  • github.com/keylime/keylime
  • github.com/keylime/keylime/commit/e1ae8de1f7b1385eaeec66572a92ff1338e6e157
  • github.com/keylime/keylime/pull/1785
  • github.com/keylime/keylime/releases/tag/v7.13.0
  • nvd.nist.gov/vuln/detail/CVE-2025-13609

Code Behaviors & Features

Detect and mitigate CVE-2025-13609 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 7.13.0

Fixed versions

  • 7.13.0

Solution

Upgrade to version 7.13.0 or above.

Impact 8.2 HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:L

Learn more about CVSS

Weakness

  • CWE-694: Use of Multiple Resources with Duplicate Identifier

Source file

pypi/keylime/CVE-2025-13609.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Thu, 04 Dec 2025 12:20:21 +0000.