An out-of-bounds write vulnerability exists in TPM2.0's Module Library allowing writing of a 2-byte data past the end of TPM2.0 command in the CryptParameterDecryption routine. An attacker who can successfully exploit this vulnerability can lead to denial of service (crashing the TPM chip/process or rendering it unusable) and/or arbitrary code execution in the TPM context.
References
Link | Resource |
---|---|
https://kb.cert.org/vuls/id/782720 | Third Party Advisory US Government Resource |
https://trustedcomputinggroup.org/about/security/ | Vendor Advisory |
https://trustedcomputinggroup.org/wp-content/uploads/TCGVRT0007-Advisory-FINAL.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2023-02-28 19:15
Updated : 2024-04-01 15:50
NVD link : CVE-2023-1017
Mitre link : CVE-2023-1017
CVE.ORG link : CVE-2023-1017
JSON object : View
Products Affected
microsoft
- windows_11_21h2
- windows_10_20h2
- windows_10_1507
- windows_server_2022
- windows_10_22h2
- windows_10_21h2
- windows_11_22h2
- windows_server_2019
- windows_10_1607
- windows_server_2016
- windows_10_1809
trustedcomputinggroup
- trusted_platform_module
CWE
CWE-787
Out-of-bounds Write