Vulnerabilities identified in TPM 2.0 can affect billions of devices

Researchers from a cybersecurity company Quarkslab have identified two flaws present in Trusted Platform Module (TPM) 2.0. According to the report, the identified weaknesses have the potential to cause difficulties for over a billion devices hosting the TPM chip.

The tech giant Microsoft, while explaining what TPM 2.0 is, said that it is a chipset used by personal computer producers. For the last 7 years, the set has been a part of the device's main circuit and is meant to assist in functions linked to device security. It can assist in generating, storing, and restricting the use of cryptographic keys which helps in altering data. Microsoft further added that most of the chips possess a security mechanism that can resist temperament.

Moving on to the weaknesses discovered by the research team, the out-of-bounds read-and-write flaws can allow malicious posers to enter the system and get their hands on sensitive information. The effects of this activity may vary from dealer to dealer.

The vulnerabilities were already highlighted by the Computer Emergency Response Team. The coordination center of the response team didn’t just publish the issue; it even notified the dealers; however, only a few of them responded and confirmed the impact. According to the warning released by CERT, malicious actors having access to the Trusted Platform Module’s interface can use it to deliver malicious orders to the chip, which, as a result, can actuate the susceptibilities. Once it has been triggered, actors can read-only or overwrite the secured data.

The report shared three versions of the module chipset that were updated and cleared of the identified faults. These versions included versions 1.59, 1.38, and 1.16. Lenovo, a tech firm, is currently the only original equipment producer that has started to take action to get rid of the flaws, although it can be expected that others might join soon.

At the end of the report, the research team added that to use the vulnerabilities for their purposes, malicious actors would require access to the PC or laptop. If any malicious software is running at the endpoint, it will have a precondition.


H/T: BC / Vector by WangXiNa freepik.

Read next: AV-TEST Puts 12 MacOS Protectors To The Test And Here Are The Favorable Facts Worth A Glance
Previous Post Next Post