An improperly initialized 'migrationAuth' value in Google's go-tpm TPM1.2 library versions prior to 0.3.0 can lead an eavesdropping attacker to discover the auth value for a key created with CreateWrapKey. An attacker listening in on the channel can collect both 'encUsageAuth' and 'encMigrationAuth', and then can calculate 'usageAuth ^ encMigrationAuth' as the 'migrationAuth' can be guessed for all keys created with CreateWrapKey. TPM2.0 is not impacted by this. We recommend updating your library to 0.3.0 or later, or, if you cannot update, to call CreateWrapKey with a random 20-byte value for 'migrationAuth'.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-0847 An improperly initialized 'migrationAuth' value in Google's go-tpm TPM1.2 library versions prior to 0.3.0 can lead an eavesdropping attacker to discover the auth value for a key created with CreateWrapKey. An attacker listening in on the channel can collect both 'encUsageAuth' and 'encMigrationAuth', and then can calculate 'usageAuth ^ encMigrationAuth' as the 'migrationAuth' can be guessed for all keys created with CreateWrapKey. TPM2.0 is not impacted by this. We recommend updating your library to 0.3.0 or later, or, if you cannot update, to call CreateWrapKey with a random 20-byte value for 'migrationAuth'.
Github GHSA Github GHSA GHSA-5x29-3hr9-6wpw TPM 1.2 key authorization values vulnerable to TPM transport eavesdropper in go-tpm
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Google

Published:

Updated: 2024-08-04T10:12:11.062Z

Reserved: 2020-02-12T00:00:00

Link: CVE-2020-8918

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-08-11T19:15:17.547

Modified: 2024-11-21T05:39:40.920

Link: CVE-2020-8918

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.