TPM 2.0 Vulnerability Woes - How your sense of security just got trampled and what you should do..
The Trusted Platform Module (TPM) 2.0 specification has two buffer overflow vulnerabilities that could allow attackers to access sensitive data like cryptographic keys. TPM is a hardware-based technology that provides secure cryptographic functions for operating systems.