Vulnerability Details CVE-2020-15093
The tough library (Rust/crates.io) prior to version 0.7.1 does not properly verify the threshold of cryptographic signatures. It allows an attacker to duplicate a valid signature in order to circumvent TUF requiring a minimum threshold of unique signatures before the metadata is considered valid. A fix is available in version 0.7.1. CVE-2020-6174 is assigned to the same vulnerability in the TUF reference implementation.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 31.8%
CVSS Severity
CVSS v3 Score 8.6
CVSS v2 Score 5.0
Products affected by CVE-2020-15093
-
-
cpe:2.3:a:amazon:tough:0.1.0
-
cpe:2.3:a:amazon:tough:0.2.0
-
cpe:2.3:a:amazon:tough:0.3.0
-
cpe:2.3:a:amazon:tough:0.4.0
-
cpe:2.3:a:amazon:tough:0.5.0
-
cpe:2.3:a:amazon:tough:0.6.0
-
cpe:2.3:a:amazon:tough:0.7.0