
Cloud Vulnerability DB
A community-led vulnerabilities database
TUF (The Update Framework) through version 0.12.1 contains a vulnerability related to improper verification of cryptographic signatures. The vulnerability was discovered in early 2020 and assigned CVE-2020-6174 (NVD).
The vulnerability is classified as CWE-347 (Improper Verification of Cryptographic Signature) with a CVSS v3.1 base score of 9.8 (CRITICAL). The issue allows multiple signatures with identical authorized keyids to be counted separately towards the threshold, effectively undermining the signature threshold verification mechanism (GitHub PR).
This vulnerability could allow an attacker to duplicate valid signatures to bypass TUF's requirement for a minimum threshold of unique signatures before metadata is considered valid. This undermines the security model of the framework's signature verification system (NVD).
The vulnerability was fixed in TUF by modifying the signature verification process to count identical authorized keyids only once towards the threshold. Users should upgrade to a version after 0.12.1 to receive the fix (GitHub PR).
The vulnerability was first reported by Erik MacLean at Analog Devices, Inc., as acknowledged in the GitHub pull request discussion (GitHub PR).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."