Missing validation of the root metatdata version number could allow an actor to supply an arbitrary version number to the client instead of the intended version in the root metadata file, altering the version fetched by the client. Users should upgrade to tough version 0.20.0 or later and ensure any forked or derivative code is patched to incorporate the new fixes.
                
            References
                    Configurations
                    History
                    14 Oct 2025, 19:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
19 Sep 2025, 14:31
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
        
        
  | 
|
| References | () https://aws.amazon.com/security/security-bulletins/AWS-2025-007/ - Vendor Advisory | |
| References | () https://github.com/awslabs/tough/security/advisories/GHSA-5vmp-m5v2-hx47 - Vendor Advisory | |
| First Time | 
        
        Amazon tough
         Amazon  | 
|
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 4.5  | 
| CPE | cpe:2.3:a:amazon:tough:*:*:*:*:*:rust:*:* | 
27 Mar 2025, 23:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-03-27 23:15
Updated : 2025-10-14 19:15
NVD link : CVE-2025-2885
Mitre link : CVE-2025-2885
CVE.ORG link : CVE-2025-2885
JSON object : View
Products Affected
                amazon
- tough
 
CWE
                
                    
                        
                        CWE-1288
                        
            Improper Validation of Consistency within Input
