Guru3D.com
  • HOME
  • NEWS
    • Channels
    • Archive
  • DOWNLOADS
    • New Downloads
    • Categories
    • Archive
  • GAME REVIEWS
  • ARTICLES
    • Rig of the Month
    • Join ROTM
    • PC Buyers Guide
    • Guru3D VGA Charts
    • Editorials
    • Dated content
  • HARDWARE REVIEWS
    • Videocards
    • Processors
    • Audio
    • Motherboards
    • Memory and Flash
    • SSD Storage
    • Chassis
    • Media Players
    • Power Supply
    • Laptop and Mobile
    • Smartphone
    • Networking
    • Keyboard Mouse
    • Cooling
    • Search articles
    • Knowledgebase
    • More Categories
  • FORUMS
  • NEWSLETTER
  • CONTACT

New Reviews
ASUS GeForce RTX 4080 Noctua OC Edition review
MSI Clutch GM51 Wireless mouse review
ASUS ROG STRIX B760-F Gaming WIFI review
Asus ROG Harpe Ace Aim Lab Edition mouse review
SteelSeries Arctis Nova Pro Headset review
Ryzen 7800X3D preview - 7950X3D One CCD Disabled
MSI VIGOR GK71 SONIC Blue keyboard review
AMD Ryzen 9 7950X3D processor review
FSP Hydro G Pro 1000W (ATX 3.0, 1000W PSU) review
Addlink S90 Lite 2TB NVMe SSD review

New Downloads
Intel ARC graphics Driver Download Version: 31.0.101.4148
GeForce 531.29 WHQL driver download
CrystalDiskInfo 9.0.0 Beta3 Download
AMD Ryzen Master Utility Download 2.10.2.2367
AMD Radeon Software Adrenalin 23.3.1 WHQL download
Display Driver Uninstaller Download version 18.0.6.1
CPU-Z download v2.05
AMD Chipset Drivers Download 5.02.19.2221
GeForce 531.18 WHQL driver download
ReShade download v5.7.0


New Forum Topics
Question about how DDU works? EVGA has terminated its partnership with Nvidia , which brand to use ? 3060ti vs 6700xt a year later Intel i225 firmware ASUS Launches ROG Swift OLED PG27AQDM at $999 Review: ASUS GeForce RTX 4080 Noctua OC Edition Display Driver Uninstaller Thread Intel’s Raptor Lake Refresh Desktop CPUs Expected to Arrive in August 2023 Red Dead Redemption 2 failing to launch, Exit code 0xc0000005 Getting my XP Partition to work after Switch to AMD




Guru3D.com » News » Newly Discovered Vulnerabilities in TPM 2.0 Specification Could Compromise Billions of Devices

Newly Discovered Vulnerabilities in TPM 2.0 Specification Could Compromise Billions of Devices

by Hilbert Hagedoorn on: 03/08/2023 10:12 AM | source: bleepingcomputer, quarkslab | 12 comment(s)
Newly Discovered Vulnerabilities in TPM 2.0 Specification Could Compromise Billions of Devices

It is a mandatory requirement for Windows 11, and yeah ... TPM2 has a nasty vulnerability. Quarkslab, a cybersecurity specialist, has identified two buffer overflow vulnerabilities in the TPM 2.0 specification that attackers can exploit to gain access to sensitive data, including cryptographic keys.

These vulnerabilities, known as CVE-2023-1017 and CVE-2023-1018, affect the reference implementation of the TPM 2.0 specification and could impact billions of devices. Both vulnerabilities are caused by the way certain TPM commands are handled and can be exploited by an authenticated local attacker to obtain information or elevated privileges. While it is not yet clear which manufacturers are affected, TPM 2.0 is a key system requirement for Windows 11. It is important to note that exploiting these backdoors requires local access, but malware can be used to infect the TPM.

"An attacker who has access to a TPM-command interface can send maliciously-crafted commands to the module and trigger these vulnerabilities," warned CERT.

"This allows either read-only access to sensitive data or overwriting of normally protected data that is only available to the TPM (e.g., cryptographic keys)."

The solution for impacted vendors is to move to a fixed version of the specification, which includes one of the following:

  • TMP 2.0 v1.59 Errata version 1.4 or higher
  • TMP 2.0 v1.38 Errata version 1.13 or higher
  • TMP 2.0 v1.16 Errata version 1.6 or higher

When it comes to the two TPM vulnerabilities, Lenovo is the only large OEM to have released a security advisory, warning that CVE-2023-1017 affects some of its systems operating on Nuvoton TPM 2.0 chips.







« DDR5 RAM Kits with 192GB Capacity Now Available from Corsair, Costing $730 · Newly Discovered Vulnerabilities in TPM 2.0 Specification Could Compromise Billions of Devices · Intel Completes Development of 1.8nm and 2nm Manufacturing Processes for its Products and Foundry Services »

3 pages 1 2 3


Valken
Senior Member



Posts: 2572
Joined: 2011-01-05

#6109705 Posted on: 03/08/2023 11:20 AM
So no vulnerability if you have TPM disabled or not in use?

TheDeeGee
Senior Member



Posts: 8620
Joined: 2010-08-28

#6109715 Posted on: 03/08/2023 12:03 PM
"requires local access".

Move along folks.

Picolete
Senior Member



Posts: 461
Joined: 2014-12-09

#6109741 Posted on: 03/08/2023 01:37 PM
They will release 3.0 and make it a requirement for Windows 12

alanm
Senior Member



Posts: 11505
Joined: 2004-05-10

#6109748 Posted on: 03/08/2023 01:51 PM
So no vulnerability if you have TPM disabled or not in use?

Pretty sure the malware author has it covered both ways. :D

Lebon30
Senior Member



Posts: 142
Joined: 2018-04-02

#6109782 Posted on: 03/08/2023 03:58 PM
...it was a matter of time, really. *sigh*
Requires local access is a bone sent our way but malware infection could help hackers hack the TPM from a distance. I could see this being exploited but not at a broad level but more at a personal, targeted level.

3 pages 1 2 3


Post New Comment
Click here to post a comment for this news story on the message forum.


Guru3D.com © 2023