CVE-2022-0317
low-risk
Published 2022-02-04
An improper input validation vulnerability in go-attestation before 0.3.3 allows local users to provide a maliciously-formed Quote over no/some PCRs, causing AKPublic.Verify to succeed despite the inconsistency. Subsequent use of the same set of PCR values in Eventlog.Verify lacks the authentication performed by quote verification, meaning a local attacker could couple this vulnerability with a maliciously-crafted TCG log in Eventlog.Verify to spoof events in the TCG log, hence defeating remotely-attested measured-boot. We recommend upgrading to Version 0.4.0 or above.
Do I need to act?
-
0.02% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
4
CVSS 4.0/10
Medium
LOCAL
/ LOW complexity
Affected Products (1)
Go-Attestation
Affected Vendors
References (2)
Third Party Advisory
https://github.com/google/go-attestation/security/advisories/GHSA-99cg-575x-774p
Third Party Advisory
https://github.com/google/go-attestation/security/advisories/GHSA-99cg-575x-774p
19
/ 100
low-risk
Severity
14/34 · Moderate
Exploitability
0/34 · Minimal
Exposure
5/34 · Minimal