An out-of-bounds read vulnerability exists in TPM2.0's Module Library allowing a 2-byte read past the end of a TPM2.0 command in the CryptParameterDecryption routine. An attacker who can successfully exploit this vulnerability can read or access sensitive data stored in the TPM.
References
Link | Resource |
---|---|
https://kb.cert.org/vuls/id/782720 | Third Party Advisory US Government Resource |
https://trustedcomputinggroup.org/about/security/ | Vendor Advisory |
https://trustedcomputinggroup.org/wp-content/uploads/TCGVRT0007-Advisory-FINAL.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2023-02-28 18:15
Updated : 2024-04-01 15:50
NVD link : CVE-2023-1018
Mitre link : CVE-2023-1018
CVE.ORG link : CVE-2023-1018
JSON object : View
Products Affected
microsoft
- windows_11_21h2
- windows_10_20h2
- windows_10_1507
- windows_server_2022
- windows_10_22h2
- windows_10_21h2
- windows_11_22h2
- windows_server_2019
- windows_10_1607
- windows_server_2016
- windows_10_1809
trustedcomputinggroup
- trusted_platform_module
CWE
CWE-125
Out-of-bounds Read