Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-29040
HistoryJun 28, 2024 - 9:02 p.m.

CVE-2024-29040 Fapi Verify Quote: Does not detect if quote was not generated by TPM

2024-06-2821:02:04
CWE-502
GitHub_M
www.cve.org
5
fapi verify quote
tpm2 software stack
cve-2024-29040
tcg
attestation
json quote info
deserialization
tpm structure
malicious device
security patch

CVSS3

4.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N

EPSS

0

Percentile

9.1%

This repository hosts source code implementing the Trusted Computing Group’s (TCG) TPM2 Software Stack (TSS). The JSON Quote Info returned by Fapi_Quote has to be deserialized by Fapi_VerifyQuote to the TPM Structure TPMS_ATTEST. For the field TPM2_GENERATED magic of this structure any number can be used in the JSON structure. The verifier can receive a state which does not represent the actual, possibly malicious state of the device under test. The malicious device might get access to data it shouldn’t, or can use services it shouldn’t be able to. This
issue has been patched in version 4.1.0.

CNA Affected

[
  {
    "vendor": "tpm2-software",
    "product": "tpm2-tss",
    "versions": [
      {
        "version": "< 4.1.0",
        "status": "affected"
      }
    ]
  }
]

CVSS3

4.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N

EPSS

0

Percentile

9.1%