Description
In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2daemon during handling of the PKDECRYPT command for TPM-backed RSA and ECC keys.
Published: 2026-01-27
Score: 8.4 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch Now
AI Analysis

Impact

The vulnerability is a stack-based buffer overflow in the tpm2daemon component of GnuPG, triggered during processing of the PKDECRYPT command for TPM-backed RSA and ECC keys. The overflow allows an attacker to overwrite adjacent memory on the stack, leading to arbitrary code execution. If successful, the attacker could execute arbitrary instructions with the privileges of the tpm2daemon process, potentially compromising system integrity, confidentiality, and availability.

Affected Systems

The flaw applies to GnuPG versions prior to 2.5.17, including any Linux or Windows deployments that use GPG4Win, which incorporates the same vulnerable GnuPG libraries. Systems that rely on TPM‑backed RSA or ECC keys and invoke the PKDECRYPT command are at risk. No specific sub‑commitment or patch level is mentioned in the CVE data; it is safe to assume all releases below 2.5.17 are affected.

Risk and Exploitability

The CVSS score of 8.4 indicates a high severity vulnerability. The EPSS score is below 1%, suggesting a low probability of exploitation in the wild at this time. The vulnerability is not currently listed in the CISA KEV catalog. Because tpm2daemon runs with elevated privileges to manage TPM functions, the attack vector is inferred to be local or remote depending on how the PKDECRYPT command is invoked; a threat actor would need to drive the vulnerable command into the daemon, possibly through crafted input data or malicious key usage. Overall, the risk is high and the vulnerability should be addressed promptly.

Generated by OpenCVE AI on April 18, 2026 at 01:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade GnuPG to version 2.5.17 or later, which contains the buffer overflow fix.
  • If an immediate upgrade is not possible, reduce the exposure by limiting the use of TPM-backed RSA/ECC keys or disabling the PKDECRYPT functionality in tpm2daemon if configuration options exist.
  • Monitor the environment for signs of exploitation, such as unexpected process creation or use of the tpm2daemon binary, and apply least‑privilege mitigations by running the daemon with minimal permissions until a patch is available.

Generated by OpenCVE AI on April 18, 2026 at 01:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 06 Feb 2026 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Gpg4win
Gpg4win gpg4win
CPEs cpe:2.3:a:gnupg:gnupg:*:*:*:*:-:*:*:*
cpe:2.3:a:gpg4win:gpg4win:*:*:*:*:*:*:*:*
Vendors & Products Gpg4win
Gpg4win gpg4win

Wed, 28 Jan 2026 16:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:gnupg:gnupg:*:*:*:*:*:*:*:*

Wed, 28 Jan 2026 12:30:00 +0000

Type Values Removed Values Added
First Time appeared Gnupg
Gnupg gnupg
Vendors & Products Gnupg
Gnupg gnupg

Wed, 28 Jan 2026 12:15:00 +0000

Type Values Removed Values Added
Title GnuPG: GnuPG: Stack-based buffer overflow in tpm2daemon allows arbitrary code execution
References
Metrics threat_severity

None

threat_severity

Important


Tue, 27 Jan 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 27 Jan 2026 19:00:00 +0000

Type Values Removed Values Added
Description In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2daemon during handling of the PKDECRYPT command for TPM-backed RSA and ECC keys.
Weaknesses CWE-121
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-01-28T15:45:56.231Z

Reserved: 2026-01-27T18:40:17.903Z

Link: CVE-2026-24882

cve-icon Vulnrichment

Updated: 2026-01-27T20:07:30.587Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-27T19:16:16.670

Modified: 2026-02-06T17:50:53.153

Link: CVE-2026-24882

cve-icon Redhat

Severity : Important

Publid Date: 2026-01-27T18:40:18Z

Links: CVE-2026-24882 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T02:00:10Z

Weaknesses