DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Get Help
CyberMaterial
Home Alerts

Massive effort to patch critical TPM flaws

March 2, 2023
Reading Time: 2 mins read
in Alerts

 

Security researchers at Quarkslab have discovered two critical vulnerabilities in the Trusted Platform Module (TPM) 2.0 reference library specification, prompting a massive effort to patch vulnerable devices across multiple vendors.

The vulnerabilities allow an attacker with authenticated local access to overwrite protected data in the TPM firmware and execute code attacks. The Trusted Computing Group (TCG) has issued an Errata document that documents the memory corruption issues and provides mitigation guidance.

The security flaws exist in the way the TPM reference spec processes parameters that are part of TPM commands. An OOB read vulnerability in the CryptParameterDecryption() routine allowed a 2-byte read access to data that was not part of the current session.

It was also possible to write 2-bytes past the end of the current command buffer, resulting in memory corruption. An attacker with access to a device built with a vulnerable version of the TPM can trigger this bug by sending crafted commands to the TPM.

TPM technology is commonly used in a variety of devices, from specialized enterprise-grade hardware to Internet of Things (IoT) appliances. With the growth of cloud computing and virtualization, software based TPM implementations have also gained popularity.

The discovery of these vulnerabilities has raised alarm bells because of the potential widespread impact on these devices. CERT coordination center urges users to apply any updates provided by hardware and software manufacturers through their supply chain as soon as possible.

In high-assurance computing environments, users should consider using TPM Remote Attestation to detect any changes to devices and ensure their TPM is tamper-proof.

As these attacks involve TPM-based software, mechanisms such as user-password or PIN protection and tpm-totp do not protect against attacks leveraging the memory corruption vulnerabilities.

Updating the firmware of TPM chips may be necessary, and this can be done through an OS vendor or the original equipment manufacturer (OEM). In some cases, the OEM may require resetting the TPM to its original factory default values as part of the update process.

Read More

Tags: AlertsAlerts 2023March 2023QuarkslabTPMTrusted Platform ModuleUpdateVulnerabilities
0
VIEWS
ADVERTISEMENT

Related Posts

Unpatched IBM file transfer software at Risk

Unpatched IBM file transfer software at Risk

March 31, 2023
Osprey Pump Controller Vulnerabilities

Osprey Pump Controller Vulnerabilities

March 31, 2023
Super FabriXss vulnerability in Azure

Super FabriXss vulnerability in Azure

March 31, 2023
Tool for Cloud Credential Harvesting

Tool for Cloud Credential Harvesting

March 31, 2023

More Articles

Jobs

Palo Alto Networks – Principal Solutions Architect, SASE/ Zero Trust

January 12, 2023
Alerts

UK Data Watchdog Issues Warning on Emotional Detection Tech

October 26, 2022
Course

Introduction to Computer Science and Programming Using Python

October 19, 2020
Quotes

”It is imperative that not only we…”

June 1, 2022

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.