Missing validation of the root metatdata version number could allow an actor to supply an arbitrary version number to the client instead of the intended version in the root metadata file, altering the version fetched by the client. Users should upgrade to tough version 0.20.0 or later and ensure any forked or derivative code is patched to incorporate the new fixes.
References
Configurations
History
14 Oct 2025, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
19 Sep 2025, 14:31
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| First Time |
Amazon
Amazon tough |
|
| CPE | cpe:2.3:a:amazon:tough:*:*:*:*:*:rust:*:* | |
| References | () https://aws.amazon.com/security/security-bulletins/AWS-2025-007/ - Vendor Advisory | |
| References | () https://github.com/awslabs/tough/security/advisories/GHSA-5vmp-m5v2-hx47 - Vendor Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.5 |
27 Mar 2025, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-03-27 23:15
Updated : 2025-10-14 19:15
NVD link : CVE-2025-2885
Mitre link : CVE-2025-2885
CVE.ORG link : CVE-2025-2885
JSON object : View
Products Affected
amazon
- tough
CWE
CWE-1288
Improper Validation of Consistency within Input
