Description
The Trusted Platform Modules (TPM) reference software may not properly track the number of times a failed shutdown happens. This can leave the TPM in a state where confidential key material in the TPM may be able to be compromised. AMD believes that the attack requires physical access of the device because the power must be repeatedly turned on and off. This potential attack may be used to change confidential information, alter executables signed by key material in the TPM, or create a denial of service of the device.
Published: 2020-11-12
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-5206 The Trusted Platform Modules (TPM) reference software may not properly track the number of times a failed shutdown happens. This can leave the TPM in a state where confidential key material in the TPM may be able to be compromised. AMD believes that the attack requires physical access of the device because the power must be repeatedly turned on and off. This potential attack may be used to change confidential information, alter executables signed by key material in the TPM, or create a denial of service of the device.
History

No history.

Subscriptions

Amd Trusted Platform Modules Reference
cve-icon MITRE

Status: PUBLISHED

Assigner: AMD

Published:

Updated: 2024-08-04T12:11:19.071Z

Reserved: 2020-05-15T00:00:00.000Z

Link: CVE-2020-12926

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-11-12T20:15:15.283

Modified: 2024-11-21T05:00:32.930

Link: CVE-2020-12926

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses