<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Tough — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/tough/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 05 May 2026 18:46:48 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/tough/feed.xml" rel="self" type="application/rss+xml"/><item><title>awslabs/tough Missing Delegated Metadata Validation</title><link>https://feed.craftedsignal.io/briefs/2024-01-tough-metadata-validation/</link><pubDate>Tue, 05 May 2026 18:46:48 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-tough-metadata-validation/</guid><description>The tough library before version 0.22.0 and tuftool before version 0.15.0 do not properly verify delegated target metadata, allowing an attacker with write access to serve expired or otherwise invalid targets from a TUF repository, potentially leading to the library trusting invalid targets.</description><content:encoded><![CDATA[<p>The <code>awslabs/tough</code> library, a Python implementation of The Update Framework (TUF), is vulnerable to a metadata validation bypass. Specifically, versions prior to 0.22.0 and tuftool versions prior to 0.15.0 do not properly enforce expiration, hash, and length checks on delegated metadata. An attacker with delegated signing authority can exploit this vulnerability to poison the local metadata cache. This occurs because the <code>load_delegations</code> function doesn&rsquo;t apply the same strict validation checks as the top-level targets metadata path. Successful exploitation allows the attacker to serve expired or otherwise invalid targets from a TUF repository, which the tough library will trust instead of rejecting, ultimately compromising the integrity of software updates.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains delegated signing authority within a TUF repository.</li>
<li>Attacker modifies delegated targets metadata to point to malicious software or manipulated metadata files. This could involve changing file hashes, lengths, or expiration dates to values that would normally be rejected.</li>
<li>Attacker hosts the modified delegated targets metadata on their controlled server.</li>
<li>A client using a vulnerable version of <code>tough</code> attempts to update its software using the TUF repository.</li>
<li>The client downloads the attacker&rsquo;s modified delegated targets metadata.</li>
<li>The vulnerable <code>load_delegations</code> function in <code>tough</code> fails to properly validate the expiration, hash, and length of the delegated targets metadata.</li>
<li>The client trusts the malicious delegated targets metadata and proceeds to download the associated malicious software or metadata.</li>
<li>The client&rsquo;s local metadata cache is poisoned, and subsequent updates may be compromised even if the attacker loses control of the delegated signing authority.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to serve malicious software updates to clients using the <code>tough</code> library. This could lead to arbitrary code execution, data theft, or other malicious activities on the client&rsquo;s system. The number of affected clients depends on the adoption of the <code>tough</code> library and its use in software update mechanisms. This vulnerability primarily impacts software supply chain security, potentially affecting any sector relying on TUF for secure updates.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the <code>tough</code> library to version 0.22.0 or later to patch CVE-2026-6967.</li>
<li>Upgrade <code>tuftool</code> to version 0.15.0 or later to patch CVE-2026-6967.</li>
<li>Monitor network traffic for unexpected connections to untrusted or unknown hosts during software update processes. Analyze associated process executions.</li>
<li>Implement integrity checks on downloaded software packages beyond TUF metadata validation to provide defense in depth.</li>
<li>Examine application logs for errors related to metadata validation failures or unexpected software installations.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>supply-chain</category><category>vulnerability</category><category>metadata-poisoning</category></item></channel></rss>