Description
An out-of-bounds write vulnerability exists in TPM2.0's Module Library allowing writing of a 2-byte data past the end of TPM2.0 command in the CryptParameterDecryption routine. An attacker who can successfully exploit this vulnerability can lead to denial of service (crashing the TPM chip/process or rendering it unusable) and/or arbitrary code execution in the TPM context.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Ubuntu USN |
USN-5933-1 | Libtpms vulnerabilities |
References
History
Tue, 04 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Subscriptions
Microsoft
Subscribe
Windows 10 1507
Subscribe
Windows 10 1607
Subscribe
Windows 10 1809
Subscribe
Windows 10 20h2
Subscribe
Windows 10 21h2
Subscribe
Windows 10 22h2
Subscribe
Windows 11 21h2
Subscribe
Windows 11 22h2
Subscribe
Windows Server 2016
Subscribe
Windows Server 2019
Subscribe
Windows Server 2022
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Rhel Eus
Subscribe
Trustedcomputinggroup
Subscribe
Trusted Platform Module
Subscribe
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2025-11-04T19:14:38.421Z
Reserved: 2023-02-24T16:02:22.626Z
Link: CVE-2023-1017
No data.
Status : Modified
Published: 2023-02-28T19:15:16.657
Modified: 2025-11-04T20:16:16.683
Link: CVE-2023-1017
OpenCVE Enrichment
No data.
Weaknesses
Ubuntu USN