TPM 2.0 Vulnerability Woes - How your sense of security just got trampled and what you should do..

The Trusted Platform Module (TPM) 2.0 specification has two buffer overflow vulnerabilities that could allow attackers to access sensitive data like cryptographic keys. TPM is a hardware-based technology that provides secure cryptographic functions for operating systems. It can store critical data like passwords, making any vulnerability in its implementation a cause for concern. Although not required for all Windows security features, TPM provides enhanced security for protecting sensitive information and encrypting data. The vulnerabilities discovered by Quarkslab’s researchers could impact billions of devices and allow an authenticated local attacker to execute code within the TPM by sending maliciously crafted commands. The impact of the vulnerabilities depends on what vendors have implemented on that memory location.

What should you do?

The solution for impacted vendors is to move to a fixed version of the specification. Lenovo has issued a security advisory, and users are advised to limit physical access to their devices, use signed applications from reputable vendors, and apply firmware updates as soon as they become available. Keep an eye out for your specific hardware vendors updates and apply them as soon as possible. If you are unsure, reach out to your IT team or have your IT decision maker reach out to IT-This Consulting to support your organization today.

References:

  • https://www.bleepingcomputer.com/news/security/new-tpm-20-flaws-could-let-hackers-steal-cryptographic-keys/

Next
Next

"New York Leads the Way in Attorneys' Cybersecurity: Protecting Confidential Client Data is the Priority"