This new TPM 2.0 security flaw could spell big trouble for "billions" of devices
"Billions" of devices could be in trouble, experts warn
Cybersecurity researchers from Quarkslab have discovered two vulnerabilities in the Trusted Platform Module (TPM) 2.0, which could spell major trouble for “billions” of devices.
TPM 2.0 is a chip that PC manufacturers have been adding to the motherboards since mid-2016. The technology, as Microsoft explains, is designed to provide “security-related functions”. The chip helps generate, store, and limit the use of cryptographic keys.
Many TPMs, the company further explains, include physical security mechanisms to make them tamper-resistant.
TPM 2.0 flaw
Now, researchers Francisco Falcon and Ivan Arce discovered out-of-bounds read (CVE-2023-1017) and out-of-bounds write (CVE-2023-1018) vulnerabilities, which could allow threat actors to escalate privileges and steal sensitive data from vulnerable endpoints. The impact of the flaws could differ from vendor to vendor, BleepingComputer said.
The CERT Coordination Center published an alert about the flaws, and claims to have been notifying vendors for months, however only a handful of entities have confirmed they are impacted.
"An attacker who has access to a TPM-command interface can send maliciously-crafted commands to the module and trigger these vulnerabilities," warned CERT. “This allows either read-only access to sensitive data or overwriting of normally protected data that is only available to the TPM (e.g., cryptographic keys)."
Organizations worried about these flaws should move to one of these fixed versions:
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
TMP 2.0 v1.59 Errata version 1.4 or higher
TMP 2.0 v1.38 Errata version 1.13 or higher
TMP 2.0 v1.16 Errata version 1.6 or higher
Apparently, Lenovo is the only major OEM to have already issued a security advisory about these flaws, with others hopefully set to follow suit soon.
To abuse the flaw, a threat actor would need to have authenticated access to a device. However, any malware already running on the endpoint would have that prerequisite, the researchers warned.
- These are the best firewalls right now
Via: BleepingComputer
Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.