Improper Validation of Consistency within Input Affecting tough package, versions <0.20.0


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.1% (29th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RUST-TOUGH-9667376
  • published6 Apr 2025
  • disclosed28 Mar 2025
  • creditJussi Kukkonen, AdamKorcz

Introduced: 28 Mar 2025

NewCVE-2025-2885  (opens in a new tab)
CWE-1288  (opens in a new tab)

How to fix?

Upgrade tough to version 0.20.0 or higher.

Overview

tough is an Update Framework (TUF) repository client

Affected versions of this package are vulnerable to Improper Validation of Consistency within Input in lib.rs, which does not sufficiently check that version numbers received by the client during the root metadata update process are sequential. An attacker can manipulate the trust relationship by replacing the root metadata files with an adequately signed but outdated version.

CVSS Base Scores

version 4.0
version 3.1