CVE-2025-13609
Python vulnerability analysis and mitigation

Overview

A vulnerability has been identified in Keylime (CVE-2025-13609) where an attacker can exploit a flaw in the registrar component that allows registration of another agent with a duplicate UUID. This vulnerability was reported in late 2025 and affects the Keylime authentication system (Red Hat CVE).

Technical details

The vulnerability exists in the Keylime registrar component where it fails to properly validate agent registration requests. Specifically, the registrar allows the registration of a different TPM device with a different EK certificate using a duplicate UUID. This security flaw enables potential identity takeover attacks (Bugzilla Report).

Impact

The vulnerability presents a critical security risk as it allows attackers to take over an existing agent's identity by re-registering with the same UUID using a different TPM's EK certificate. This could lead to unauthorized access and potential compromise of the affected systems (Bugzilla Report).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-62703HIGH8.8
  • PythonPython
  • fugue
NoNoNov 25, 2025
CVE-2025-13609HIGH8.2
  • PythonPython
  • keylime
NoYesNov 24, 2025
CVE-2025-66019MEDIUM6.6
  • PythonPython
  • pypdf
NoYesNov 26, 2025
GHSA-m449-cwjh-6pw7MEDIUM6.6
  • PythonPython
  • pypdf
NoYesNov 24, 2025
GHSA-j4gv-6x9v-v23gLOW1.3
  • PythonPython
  • omero-web
NoYesNov 24, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management