CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ⬡ Vulnerabilities & CVEs Apr 25, 2026

CVE-2026-6967 | AWS tough/tuftool up to 0.21.x load_delegations data authenticity (EUVD-2026-25628)

VulDB Archived Apr 25, 2026 ✓ Full text saved

A vulnerability was found in AWS tough and tuftool up to 0.21.x . It has been classified as problematic . Affected is the function load_delegations . The manipulation leads to insufficient verification of data authenticity. This vulnerability is uniquely identified as CVE-2026-6967 . The attack is possible to be carried out remotely. No exploit exists. Upgrading the affected component is recommended.

Full text archived locally
✦ AI Summary · Claude Sonnet


    VDB-359568 · CVE-2026-6967 · EUVD-2026-25628 AWS TOUGH/TUFTOOL UP TO 0.21.X LOAD_DELEGATIONS DATA AUTHENTICITY HISTORYDIFFRELATEJSONXMLCTI CVSS Meta Temp Score Current Exploit Price (≈) CTI Interest Score 4.9 $0-$5k 3.38+ Summaryinfo A vulnerability was found in AWS tough and tuftool up to 0.21.x. It has been declared as problematic. Affected by this vulnerability is the function load_delegations. The manipulation results in data authenticity. This vulnerability was named CVE-2026-6967. The attack may be performed from remote. There is no available exploit. It is recommended to upgrade the affected component. Detailsinfo A vulnerability classified as problematic has been found in AWS tough and tuftool up to 0.21.x. Affected is the function load_delegations. The manipulation with an unknown input leads to a data authenticity vulnerability. CWE is classifying the issue as CWE-345. The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data. This is going to have an impact on integrity, and availability. CVE summarizes: Missing expiration, hash, and length enforcement in delegated metadata validation in awslabs/tough before tough-v0.22.0 allows remote authenticated users with delegated signing authority to bypass TUF specification integrity checks for delegated targets metadata and poison the local metadata cache, because load_delegations does not apply the same validation checks as the top-level targets metadata path. We recommend you upgrade to tough-v0.22.0 / tuftool-v0.15.0. The advisory is shared for download at aws.amazon.com. This vulnerability is traded as CVE-2026-6967 since 04/24/2026. The exploitability is told to be difficult. It is possible to launch the attack remotely. There are known technical details, but no exploit is available. Upgrading to version 0.22.0 eliminates this vulnerability. The upgrade is hosted for download at github.com. The vulnerability is also documented in the vulnerability database at EUVD (EUVD-2026-25628). Productinfo Vendor AWS Name tough tuftool Version 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 0.10 0.11 0.12 0.13 0.14 0.15 0.16 0.17 0.18 0.19 0.20 0.21 CPE 2.3info 🔒 🔒 🔒 CPE 2.2info 🔒 🔒 🔒 CVSSv4info VulDB Vector: 🔒 VulDB Reliability: 🔍 CNA CVSS-B Score: 🔒 CNA CVSS-BT Score: 🔒 CNA Vector: 🔒 CVSSv3info VulDB Meta Base Score: 5.1 VulDB Meta Temp Score: 4.9 VulDB Base Score: 4.2 VulDB Temp Score: 4.0 VulDB Vector: 🔒 VulDB Reliability: 🔍 CNA Base Score: 5.9 CNA Vector (AMZN): 🔒 CVSSv2info Vector Complexity Authentication Confidentiality Integrity Availability Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock VulDB Base Score: 🔒 VulDB Temp Score: 🔒 VulDB Reliability: 🔍 Exploitinginfo Class: Data authenticity CWE: CWE-345 CAPEC: 🔒 ATT&CK: 🔒 Physical: No Local: No Remote: Yes Availability: 🔒 Status: Not defined Price Prediction: 🔍 Current Price Estimation: 🔒 0-Day Unlock Unlock Unlock Unlock Today Unlock Unlock Unlock Unlock Threat Intelligenceinfo Interest: 🔍 Active Actors: 🔍 Active APT Groups: 🔍 Countermeasuresinfo Recommended: Upgrade Status: 🔍 0-Day Time: 🔒 Upgrade: tough/tuftool 0.22.0 Timelineinfo 04/24/2026 Advisory disclosed 04/24/2026 +0 days CVE reserved 04/24/2026 +0 days VulDB entry created 04/25/2026 +0 days VulDB entry last update Sourcesinfo Advisory: aws.amazon.com Status: Confirmed CVE: CVE-2026-6967 (🔒) GCVE (CVE): GCVE-0-2026-6967 GCVE (VulDB): GCVE-100-359568 EUVD: 🔒 Entryinfo Created: 04/24/2026 23:08 Updated: 04/25/2026 00:52 Changes: 04/24/2026 23:08 (76), 04/25/2026 00:52 (1) Complete: 🔍 Cache ID: 99:A5A:101 Discussion No comments yet. Languages: en. Please log in to comment. ◂ PreviousOverviewNext ▸
    💬 Team Notes
    Article Info
    Source
    VulDB
    Category
    ⬡ Vulnerabilities & CVEs
    Published
    Apr 25, 2026
    Archived
    Apr 25, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗