CVE CVE-2020-15093 Mappings

The tough library (Rust/crates.io) prior to version 0.7.1 does not properly verify the threshold of cryptographic signatures. It allows an attacker to duplicate a valid signature in order to circumvent TUF requiring a minimum threshold of unique signatures before the metadata is considered valid. A fix is available in version 0.7.1. CVE-2020-6174 is assigned to the same vulnerability in the TUF reference implementation.

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name
CVE-2020-15093 tough primary_impact T1078 Valid Accounts
CVE-2020-15093 tough primary_impact T1557 Man-in-the-Middle
CVE-2020-15093 tough primary_impact T1040 Network Sniffing
CVE-2020-15093 tough exploitation_technique T1110 Brute Force