First published: Thu Jul 09 2020(Updated: )
The tough library (Rust/crates.io) prior to version 0.7.1 does not properly verify the threshold of cryptographic signatures. It allows an attacker to duplicate a valid signature in order to circumvent TUF requiring a minimum threshold of unique signatures before the metadata is considered valid. A fix is available in version 0.7.1. CVE-2020-6174 is assigned to the same vulnerability in the TUF reference implementation.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Amazon Tough | <0.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2020-15093.
The severity of CVE-2020-15093 is high with a severity value of 8.6.
Versions prior to 0.7.1 of the tough library (Rust/crates.io) are affected by CVE-2020-15093.
CVE-2020-15093 allows an attacker to duplicate a valid signature, bypassing TUF's requirement for a minimum threshold of unique signatures.
You can find more information about CVE-2020-15093 in the following references: [1](https://crates.io/crates/tough) [2](https://github.com/awslabs/tough/security/advisories/GHSA-5q2r-92f9-4m49) [3](https://github.com/theupdateframework/tuf/commit/2977188139d065ff3356c3cb4aec60c582b57e0e).