Tuesday, March 7th 2023

New Vulnerabilities Found in TPM 2.0 Library That Could be a Potential Threat to Billions of Devices

A pair of new vulnerabilities has been found in the TPM 2.0 library by cybersecurity company Quarkslab, that has security experts worried, as both of the flaws have potential far reaching implications. The two vulnerabilities go under the CVE identifiers of CVE-2023-1017 and CVE-2023-1018, where the first one allows for out-of-bounds writes, whereas the second one enables out-of-bounds reads, also known as buffer overflow vulnerabilities. This in itself might not sound particularly concerning, but as both can be triggered from user-mode applications, they're a pretty big deal, as it would enable malicious commands to be sent to a TPM 2.0 module, which could in turn enable malicious software to be installed on the device with the TPM 2.0 module.

According to Quarkslab, billions of devices could be affected, as TPM 2.0 authentication modules are used in everything from servers to IoT devices and has been the main hardware-based crypto solution for almost a decade by now. The attacker using the vulnerabilities would have to know what they're doing to be able to take advantage of these two flaws in TPM 2.0, but as it relies on the TPM command interface, there's no easy way to protect against an attack, if someone has gained user access to the system in question. The Trusted Computing Group (TCG) which is in charge of the TPM standard, has already issued an errata which includes instructions on how to address the two vulnerabilities and we're like to see updates from all major hardware vendors as they see fit.
Sources: Quarkslab, via Hacker News, Trusted Computing Group (errata)
Add your own comment

33 Comments on New Vulnerabilities Found in TPM 2.0 Library That Could be a Potential Threat to Billions of Devices

#26
VolutedJoker
lexluthermiesterMaybe.

You should have just used a bypass and used 11 anyway. The requirements are just microsoft BS anyway.
From what I read that works when your installing a fresh copy of Windows 11. I wasn't, I was merely doing the upgrade. It's honestly not a big deal, it's on a system that's barely used. Just found it funny that the vulnerability post came out hours after I did it.
Posted on Reply
#27
ThrashZone
VolutedJokerFrom what I read that works when your installing a fresh copy of Windows 11. I wasn't, I was merely doing the upgrade. It's honestly not a big deal, it's on a system that's barely used. Just found it funny that the vulnerability post came out hours after I did it.
Hi,
MS does additional checks for compatibility for large updates to be offered as well so the bypass needs to be done again eventually and to do those bypasses you need to mount another build iso and use save files and apps.
So you wouldn't need to do this on that machine.

The tpm venerability people are more likely to be hit by a train or airplane or on a positive note more likely to hit the lottery so buy them powerball tickets now :laugh:
Posted on Reply
#28
lexluthermiester
VolutedJokerFrom what I read that works when your installing a fresh copy of Windows 11. I wasn't, I was merely doing the upgrade.
Then you should. Back your important files and data, start fresh.
R-T-BLots of misunderstandings in this thread, don't even know where to begin...
Oh, do tell.
Posted on Reply
#29
A Computer Guy
lexluthermiesterOh, do tell.
Inquiring minds want to know...
Posted on Reply
#30
TumbleGeorge
A Computer GuyInquiring minds want to know...
Oh, go baby :)
Posted on Reply
#31
chrcoluk
I went in my bios today to check some stuff, and was sitting on the TPM screen for a while wondering if I should disable again, nothing to do with this, as only just seen this post, but was wondering what actually uses TPM aside from DRM?
Posted on Reply
#32
R-T-B
lexluthermiesterOh, do tell.
Wouldn't know where to start, 1/2 posts here has misinformation. Simple as that. From blaming MS for the standard to fundamentally misunderstanding what a TPM even does, it's rapant.
Posted on Reply
#33
lexluthermiester
VolutedJokerWhy are you giving me a hard time? I already stated why I did the upgrade route. If it was important obviously I would do a fresh install. I'm not asking for your comments so just move on.
Oh I apologize. Didn't mean for it to seem that way. I was just suggesting that's what you should do anyway. I am sorry.
R-T-BWouldn't know where to start, 1/2 posts here has misinformation. Simple as that. From blaming MS for the standard to fundamentally misunderstanding what a TPM even does, it's rapant.
Ah, gotcha.
Posted on Reply
Add your own comment
Dec 19th, 2024 06:50 EST change timezone

New Forum Posts

Popular Reviews

Controversial News Posts