Saturday, April 1, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory
  • Login
  • Register
Cloud7
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7
No Result
View All Result

Home > Cybersecurity > New Trusted Platform Module vulnerabilities raises alarm bells

New Trusted Platform Module vulnerabilities raises alarm bells

Security researchers at Quarkslab have identified two vulnerabilities in the Trusted Platform Module (TPM) that could be used to access sensitive information and send harmful commands to the TPM.


Ezgi Koc Ezgi Koc
March 9, 2023
2 min read
  • Security researchers at Quarkslab have identified two buffer overflow vulnerabilities in the Trusted Platform Module (TPM) that could be exploited.
  • An attacker with access to a device that has a susceptible TPM version may be able to exploit it by giving it specific commands.
  • To address these issues, the Trusted Computing Group (TCG) has published an update to their Errata for TPM 2.0 Library Standard.

Two buffer overflow flaws were discovered by security researchers at Quarkslab in the Trusted Platform Module (TPM), which might give a malicious actor access to sensitive data that is generally protected or read-only. The microcontroller chip called the Trusted Platform Module is used for its hardware-based security capabilities to safeguard sensitive data on a computer system. People recently knew more about the TPM module since Microsoft made it a requirement for Windows 11 installation.

How the vulnerability works

The “Session-based encryption” described in the TPM Library Standard Architecture enables a cryptographic client program to carry out a variety of tasks, including those that offer Parameter Encryption capabilities.

Two flaws, which can be tracked as CVE-2023-1017 and CVE-2023-1018, in the way the TPM reference specification handles certain of these parameters that are a component of TPM instructions were discovered by Quarkslab security researchers. An Out Of Bound (OOB) read vulnerability in the CryptParameterDecryption() procedure permitted 2-byte read access to data that was not part of the current session. Moreover, it was possible to write 2 bytes past the end of the active command buffer without causing memory damage.

If a device has a vulnerable TPM version, an attacker with access to it may be able to take advantage of a flaw in the TPM by sending it particular commands. The TPM might be tricked into accessing data that wasn’t intended to be accessed in this way. It can be difficult to identify or stop such unwanted access using conventional host-based security measures because the operating system depends on the TPM firmware to carry out these tasks.

Currently known affected systems.

Solution

The Trusted Computing Group (TCG) has released an update to their Errata for TPM 2.0 Library Specification with instructions, so OEMs can address these vulnerabilities. The fixed versions of the specifications can be seen below:

  • TPM 2.0 v1.59 Erreta version 1.4 or newer
  • TPM 2.0 v1.38 Errata version 1.13 or newer
  • TPM 2.0 v1.16 Errata version 1.6 or newer

However, it will likely take some time for the vendors to release the fixed firmware. Keep your eye on your vendor’s website for an update, or contact them.

See more Cybersecurity News

A comprehensive guide to understanding Cybersecurity: What is Cybersecurity?


Tags: Vulnerability
Ezgi Koc

Ezgi Koc

Ezgi Koc is an editor at Cloud7. She graduated from Ege University with a bachelor's degree in English Language and Literature. She has always had great interest in technology, both hardware and software, since her childhood and decided to pursue a career that would enable her to broaden her horizons in this field. She is very passionate about video games as a Twitch affiliate and streams games in her free time.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
Flathub's plans for 2023 are revealed

Flathub's plans for 2023 are revealed

Related News

7 best practices and tools to use for Linux security

7 best practices and tools to use for Linux security

March 24, 2023 5:00 pm
CISA aims to identify vulnerabilities that attract ransomware

CISA aims to identify vulnerabilities that attract ransomware

March 22, 2023 2:10 pm
7 best cybersecurity schools

7 best cybersecurity schools

March 21, 2023 9:00 pm
Akamai researchers warn about the new HinataBot botnet

Akamai researchers warn about the new HinataBot botnet

March 20, 2023 6:10 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Recent News

  • How to take a screenshot on Windows 11
  • 7 games you can play on the Linux terminal
  • Leostream announces hybrid cloud environments with WorkSpaces Core
  • Now you can move Yandex Mail to ispmanager
  • 7 best SEO plugins for WordPress

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • Artificial Intelligence
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About Us
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2023, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

© 2023, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.