Vulnerabilites related to AWS - tough
cve-2025-2887
Vulnerability from cvelistv5
Published
2025-03-27 22:23
Modified
2025-03-28 14:44
Summary
During a target rollback, the client fails to detect the rollback for delegated targets. This could cause the client to fetch a target from an incorrect source, altering the target contents. Users should upgrade to tough version 0.20.0 or later and ensure any forked or derivative code is patched to incorporate the new fixes.
Impacted products
Vendor Product Version
AWS tough Version: 0.1.0   
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2025-2887",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-03-28T14:44:40.783814Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-03-28T14:44:49.310Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "tough",
               repo: "https://github.com/awslabs/tough",
               vendor: "AWS",
               versions: [
                  {
                     lessThan: "0.20.0",
                     status: "affected",
                     version: "0.1.0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         datePublic: "2025-03-27T21:30:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<p>During a target rollback, the client fails to detect the rollback for delegated targets. This could cause the client to fetch a target from an incorrect source, altering the target contents. Users should upgrade to tough version 0.20.0 or later and ensure any forked or derivative code is patched to incorporate the new fixes.<br></p>",
                  },
               ],
               value: "During a target rollback, the client fails to detect the rollback for delegated targets. This could cause the client to fetch a target from an incorrect source, altering the target contents. Users should upgrade to tough version 0.20.0 or later and ensure any forked or derivative code is patched to incorporate the new fixes.",
            },
         ],
         impacts: [
            {
               capecId: "CAPEC-25",
               descriptions: [
                  {
                     lang: "en",
                     value: "CAPEC-25 Forced Deadlock",
                  },
               ],
            },
         ],
         metrics: [
            {
               cvssV4_0: {
                  Automatable: "NOT_DEFINED",
                  Recovery: "NOT_DEFINED",
                  Safety: "NOT_DEFINED",
                  attackComplexity: "HIGH",
                  attackRequirements: "NONE",
                  attackVector: "NETWORK",
                  baseScore: 5.7,
                  baseSeverity: "MEDIUM",
                  privilegesRequired: "HIGH",
                  providerUrgency: "NOT_DEFINED",
                  subAvailabilityImpact: "NONE",
                  subConfidentialityImpact: "NONE",
                  subIntegrityImpact: "NONE",
                  userInteraction: "PASSIVE",
                  valueDensity: "NOT_DEFINED",
                  vectorString: "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N",
                  version: "4.0",
                  vulnAvailabilityImpact: "NONE",
                  vulnConfidentialityImpact: "NONE",
                  vulnIntegrityImpact: "HIGH",
                  vulnerabilityResponseEffort: "NOT_DEFINED",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-1025",
                     description: "CWE-1025: Comparison Using Wrong Factors",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-03-27T22:23:04.038Z",
            orgId: "ff89ba41-3aa1-4d27-914a-91399e9639e5",
            shortName: "AMZN",
         },
         references: [
            {
               url: "https://github.com/awslabs/tough/security/advisories/GHSA-q6r9-r9pw-4cf7",
            },
            {
               url: "https://aws.amazon.com/security/security-bulletins/AWS-2025-007/",
            },
         ],
         source: {
            discovery: "UNKNOWN",
         },
         title: "Failure to detect delegated target rollback in tough",
         x_generator: {
            engine: "Vulnogram 0.2.0",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "ff89ba41-3aa1-4d27-914a-91399e9639e5",
      assignerShortName: "AMZN",
      cveId: "CVE-2025-2887",
      datePublished: "2025-03-27T22:23:04.038Z",
      dateReserved: "2025-03-27T21:08:15.590Z",
      dateUpdated: "2025-03-28T14:44:49.310Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2025-2885
Vulnerability from cvelistv5
Published
2025-03-27 22:18
Modified
2025-03-28 15:47
Summary
Missing validation of the root metatdata version number could allow an actor to supply an arbitrary version number to the client instead of the intended version in the root metadata file, altering the version fetched by the client. Users should upgrade to tough version 0.20.0 or later and ensure any forked or derivative code is patched to incorporate the new fixes.
Impacted products
Vendor Product Version
AWS tough Version: 0.1.0   
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2025-2885",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-03-28T15:47:22.646997Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-03-28T15:47:35.890Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "tough",
               repo: "https://github.com/awslabs/tough",
               vendor: "AWS",
               versions: [
                  {
                     lessThan: "0.20.0",
                     status: "affected",
                     version: "0.1.0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         datePublic: "2025-03-27T21:30:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<p>Missing validation of the root metatdata version number could allow an actor to supply an arbitrary version number to the client instead of the intended version in the root metadata file, altering the version fetched by the client. Users should upgrade to tough version 0.20.0 or later and ensure any forked or derivative code is patched to incorporate the new fixes.<br></p>",
                  },
               ],
               value: "Missing validation of the root metatdata version number could allow an actor to supply an arbitrary version number to the client instead of the intended version in the root metadata file, altering the version fetched by the client. Users should upgrade to tough version 0.20.0 or later and ensure any forked or derivative code is patched to incorporate the new fixes.",
            },
         ],
         impacts: [
            {
               capecId: "CAPEC-153",
               descriptions: [
                  {
                     lang: "en",
                     value: "CAPEC-153 Input Data Manipulation",
                  },
               ],
            },
         ],
         metrics: [
            {
               cvssV4_0: {
                  Automatable: "NOT_DEFINED",
                  Recovery: "NOT_DEFINED",
                  Safety: "NOT_DEFINED",
                  attackComplexity: "HIGH",
                  attackRequirements: "NONE",
                  attackVector: "NETWORK",
                  baseScore: 5.7,
                  baseSeverity: "MEDIUM",
                  privilegesRequired: "HIGH",
                  providerUrgency: "NOT_DEFINED",
                  subAvailabilityImpact: "NONE",
                  subConfidentialityImpact: "NONE",
                  subIntegrityImpact: "NONE",
                  userInteraction: "PASSIVE",
                  valueDensity: "NOT_DEFINED",
                  vectorString: "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N",
                  version: "4.0",
                  vulnAvailabilityImpact: "NONE",
                  vulnConfidentialityImpact: "NONE",
                  vulnIntegrityImpact: "HIGH",
                  vulnerabilityResponseEffort: "NOT_DEFINED",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-1288",
                     description: "CWE-1288: Improper Validation of Consistency within Input",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-03-27T22:24:07.334Z",
            orgId: "ff89ba41-3aa1-4d27-914a-91399e9639e5",
            shortName: "AMZN",
         },
         references: [
            {
               url: "https://github.com/awslabs/tough/security/advisories/GHSA-5vmp-m5v2-hx47",
            },
            {
               url: "https://aws.amazon.com/security/security-bulletins/AWS-2025-007/",
            },
         ],
         source: {
            discovery: "UNKNOWN",
         },
         title: "Root metadata version not validated in tough",
         x_generator: {
            engine: "Vulnogram 0.2.0",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "ff89ba41-3aa1-4d27-914a-91399e9639e5",
      assignerShortName: "AMZN",
      cveId: "CVE-2025-2885",
      datePublished: "2025-03-27T22:18:11.727Z",
      dateReserved: "2025-03-27T21:08:13.996Z",
      dateUpdated: "2025-03-28T15:47:35.890Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2025-2886
Vulnerability from cvelistv5
Published
2025-03-27 22:22
Modified
2025-03-28 15:43
Summary
Missing validation of terminating delegation causes the client to continue searching the defined delegation list, even after searching a terminating delegation. This could cause the client to fetch a target from an incorrect source, altering the target contents. Users should upgrade to tough version 0.20.0 or later and ensure any forked or derivative code is patched to incorporate the new fixes.
Impacted products
Vendor Product Version
AWS tough Version: 0.1.0   
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2025-2886",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-03-28T15:43:34.765460Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-03-28T15:43:49.713Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "tough",
               repo: "https://github.com/awslabs/tough",
               vendor: "AWS",
               versions: [
                  {
                     lessThan: "0.20.0",
                     status: "affected",
                     version: "0.1.0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         datePublic: "2025-03-27T21:30:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<p></p><p></p><p>Missing validation of terminating delegation causes the client to continue searching the defined delegation list, even after searching a terminating delegation. This could cause the client to fetch a target from an incorrect source, altering the target contents. Users should upgrade to tough version 0.20.0 or later and ensure any forked or derivative code is patched to incorporate the new fixes.</p><p></p><p></p>",
                  },
               ],
               value: "Missing validation of terminating delegation causes the client to continue searching the defined delegation list, even after searching a terminating delegation. This could cause the client to fetch a target from an incorrect source, altering the target contents. Users should upgrade to tough version 0.20.0 or later and ensure any forked or derivative code is patched to incorporate the new fixes.",
            },
         ],
         impacts: [
            {
               capecId: "CAPEC-439",
               descriptions: [
                  {
                     lang: "en",
                     value: "CAPEC-439 Manipulation During Distribution",
                  },
               ],
            },
         ],
         metrics: [
            {
               cvssV4_0: {
                  Automatable: "NOT_DEFINED",
                  Recovery: "NOT_DEFINED",
                  Safety: "NOT_DEFINED",
                  attackComplexity: "HIGH",
                  attackRequirements: "NONE",
                  attackVector: "NETWORK",
                  baseScore: 5.7,
                  baseSeverity: "MEDIUM",
                  privilegesRequired: "HIGH",
                  providerUrgency: "NOT_DEFINED",
                  subAvailabilityImpact: "NONE",
                  subConfidentialityImpact: "NONE",
                  subIntegrityImpact: "NONE",
                  userInteraction: "PASSIVE",
                  valueDensity: "NOT_DEFINED",
                  vectorString: "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N",
                  version: "4.0",
                  vulnAvailabilityImpact: "NONE",
                  vulnConfidentialityImpact: "NONE",
                  vulnIntegrityImpact: "HIGH",
                  vulnerabilityResponseEffort: "NOT_DEFINED",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-670",
                     description: "CWE-670 Always-Incorrect Control Flow Implementation",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-03-27T22:22:14.382Z",
            orgId: "ff89ba41-3aa1-4d27-914a-91399e9639e5",
            shortName: "AMZN",
         },
         references: [
            {
               url: "https://github.com/awslabs/tough/security/advisories/GHSA-v4wr-j3w6-mxqc",
            },
            {
               url: "https://aws.amazon.com/security/security-bulletins/AWS-2025-007/",
            },
         ],
         source: {
            discovery: "UNKNOWN",
         },
         title: "Terminating targets role delegations are not respected in tough",
         x_generator: {
            engine: "Vulnogram 0.2.0",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "ff89ba41-3aa1-4d27-914a-91399e9639e5",
      assignerShortName: "AMZN",
      cveId: "CVE-2025-2886",
      datePublished: "2025-03-27T22:22:14.382Z",
      dateReserved: "2025-03-27T21:08:14.876Z",
      dateUpdated: "2025-03-28T15:43:49.713Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2025-2888
Vulnerability from cvelistv5
Published
2025-03-27 22:23
Modified
2025-03-28 14:33
Summary
During a snapshot rollback, the client incorrectly caches the timestamp metadata. If the client checks the cache when attempting to perform the next update, the update timestamp validation will fail, preventing the next update until the cache is cleared. Users should upgrade to tough version 0.20.0 or later and ensure any forked or derivative code is patched to incorporate the new fixes.
Impacted products
Vendor Product Version
AWS tough Version: 0.1.0   
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2025-2888",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-03-28T14:33:15.822940Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-03-28T14:33:40.221Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "tough",
               repo: "https://github.com/awslabs/tough",
               vendor: "AWS",
               versions: [
                  {
                     lessThan: "0.20.0",
                     status: "affected",
                     version: "0.1.0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<p>During a snapshot rollback, the client incorrectly caches the timestamp metadata. If the client checks the cache when attempting to perform the next update, the update timestamp validation will fail, preventing the next update until the cache is cleared. Users should upgrade to tough version 0.20.0 or later and ensure any forked or derivative code is patched to incorporate the new fixes.</p>",
                  },
               ],
               value: "During a snapshot rollback, the client incorrectly caches the timestamp metadata. If the client checks the cache when attempting to perform the next update, the update timestamp validation will fail, preventing the next update until the cache is cleared. Users should upgrade to tough version 0.20.0 or later and ensure any forked or derivative code is patched to incorporate the new fixes.",
            },
         ],
         impacts: [
            {
               capecId: "CAPEC-25",
               descriptions: [
                  {
                     lang: "en",
                     value: "CAPEC-25 Forced Deadlock",
                  },
               ],
            },
         ],
         metrics: [
            {
               cvssV4_0: {
                  Automatable: "NOT_DEFINED",
                  Recovery: "NOT_DEFINED",
                  Safety: "NOT_DEFINED",
                  attackComplexity: "HIGH",
                  attackRequirements: "NONE",
                  attackVector: "NETWORK",
                  baseScore: 5.7,
                  baseSeverity: "MEDIUM",
                  privilegesRequired: "HIGH",
                  providerUrgency: "NOT_DEFINED",
                  subAvailabilityImpact: "NONE",
                  subConfidentialityImpact: "NONE",
                  subIntegrityImpact: "NONE",
                  userInteraction: "PASSIVE",
                  valueDensity: "NOT_DEFINED",
                  vectorString: "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N",
                  version: "4.0",
                  vulnAvailabilityImpact: "NONE",
                  vulnConfidentialityImpact: "NONE",
                  vulnIntegrityImpact: "HIGH",
                  vulnerabilityResponseEffort: "NOT_DEFINED",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-1025",
                     description: "CWE-1025: Comparison Using Wrong Factors",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-03-27T22:23:48.886Z",
            orgId: "ff89ba41-3aa1-4d27-914a-91399e9639e5",
            shortName: "AMZN",
         },
         references: [
            {
               url: "https://github.com/awslabs/tough/security/advisories/GHSA-76g3-38jv-wxh4",
            },
            {
               url: "https://aws.amazon.com/security/security-bulletins/AWS-2025-007/",
            },
         ],
         source: {
            discovery: "UNKNOWN",
         },
         title: "Improper timestamp caching during snapshot rollback in tough",
         x_generator: {
            engine: "Vulnogram 0.2.0",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "ff89ba41-3aa1-4d27-914a-91399e9639e5",
      assignerShortName: "AMZN",
      cveId: "CVE-2025-2888",
      datePublished: "2025-03-27T22:23:48.886Z",
      dateReserved: "2025-03-27T21:08:16.138Z",
      dateUpdated: "2025-03-28T14:33:40.221Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}