CVE-2026-6420 — Keylime Vulnerability

CVE-2026-6420 — Keylime Vulnerability

CVE-2026-6420 — A flaw was found in Keylime. An attacker with root access on an enrolled monitored machine, where the Keylime agent runs, can exploit a vulnerability in the Keylime verifier. The verifier uses a hardcoded challenge nonce for Trusted Platform Module (TPM) quote attestation instead of

What This Means For You

  • If your environment is affected by CWE-1241, review your exposure and prioritize patching based on your environment. Monitor vendor advisories for CVE-2026-6420 updates and patches.

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

high T1548.002 Privilege Escalation

CVE-2026-6420 - Keylime Verifier Hardcoded Challenge Nonce Replay

Sigma YAML — free preview
title: CVE-2026-6420 - Keylime Verifier Hardcoded Challenge Nonce Replay
id: scw-2026-05-06-ai-1
status: experimental
level: high
description: |
  Detects the exploitation of CVE-2026-6420 by identifying the Keylime agent process being executed with root privileges, potentially initiated via sudo, and specifically looking for command-line arguments related to TPM quote attestation. This indicates an attacker with root access attempting to exploit the hardcoded challenge nonce vulnerability to stockpile and replay TPM quotes.
author: SCW Feed Engine (AI-generated)
date: 2026-05-06
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2026-6420/
tags:
  - attack.privilege_escalation
  - attack.t1548.002
logsource:
    category: process_creation
detection:
  selection:
      Image|endswith:
          - 'keylime_agent'
      CommandLine|contains:
          - 'tpm_quote_attestation'
      ParentImage|contains:
          - '/usr/bin/sudo'
      User|contains:
          - 'root'
  condition: selection
falsepositives:
  - Legitimate administrative activity

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-6420 vulnerability CVE-2026-6420
CWE-1241 weakness CWE-1241
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedMay 06, 2026 at 14:16 UTC

This content was curated and summarized by Shimi's Cyber World for informational purposes. It is not copied or republished in full. All intellectual property rights remain with the original author and source.

Believe this infringes your rights? Submit a takedown request.

Related coverage

HCL BigFix RunBookAI Vulnerability Allows Command Smuggling

CVE-2025-31951 — HCL BigFix RunBookAI is affected by a Unvalidated Command Input / Potential Command Smuggling vulnerability. A flaw in a component's input handling was...

vulnerabilityCVEhigh-severitycwe-77cwe-351cwe-451
/SCW Vulnerability Desk /HIGH /8.8 /⚑ 2 IOCs /⚙ 2 Sigma

CVE-2025-31970 — Cross-Site Scripting (XSS)

CVE-2025-31970 — HCL DFXAnalytics is affected by an Insecure Security Header configuration vulnerability where the Content-Security-Policy does not define strict directives for object-src and base-uri,...

vulnerabilityCVEmedium-severitycross-site-scripting-xsscwe-358
/SCW Vulnerability Desk /MEDIUM /5.3 /⚑ 2 IOCs

CVE-2026-40001 — Code Execution

CVE-2026-40001 — There is a local privilege escalation vulnerability in the ZTE PROCESS Guard service of the cloud computer client, which may allow local arbitrary...

vulnerabilityCVEmedium-severitycode-executioncwe-269
/SCW Vulnerability Desk /MEDIUM /5.2 /⚑ 2 IOCs /⚙ 2 Sigma