A vulnerability has been identified in keylime where an attacker can exploit this flaw by registering a new agent using a different Trusted Platform Module (TPM) device but claiming an existing agents unique identifier (UUID). This action overwrites the legitimate agents identity, enabling the attacker to impersonate the compromised agent and potentially bypass security controls.
The product uses multiple resources that can have the same identifier, in a context in which unique identifiers are required.