CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-29039

Medium Severity
SVRS
34/100

CVSSv3
NA/10

EPSS
0.00078/1

CVE-2024-29039 allows attackers to manipulate tpm2_checkquote outputs, leading to a misleading picture of the TPM state. This impacts the trustworthiness of security attestations. The vulnerability in the Trusted Platform Module (TPM2.0) tools source repository stems from improper handling of TPML_PCR_SELECTION within the PCR input file, causing incorrect mapping of digest values. An attacker can exploit this to misrepresent the system's security posture. While the CVSS score is 0, indicating a base severity of none, the SOCRadar Vulnerability Risk Score (SVRS) of 34 suggests a low to moderate risk. Though not critical, this vulnerability could be used to bypass security measures if chained with other exploits. Update to version 5.7 to patch this security vulnerability and maintain the integrity of your TPM.

No tags available
2024-06-28

2024-06-28
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-29039 is a vulnerability in tpm2, the source repository for Trusted Platform Module (TPM2.0) tools. It allows attackers to manipulate tpm2_checkquote outputs by altering the TPML_PCR_SELECTION in the PCR input file. This results in incorrect mapping of digest values to PCR slots and banks, providing a misleading representation of the TPM state.

Key Insights

  • High Severity: The CVSS score of 9 indicates a high severity vulnerability, requiring immediate attention.
  • SVRS Score: The SOCRadar Vulnerability Risk Score (SVRS) of 34 suggests a moderate risk, highlighting the need for monitoring and mitigation.
  • Exploit Status: Active exploits have been published, indicating that attackers are actively exploiting this vulnerability.
  • CISA Warning: The Cybersecurity and Infrastructure Security Agency (CISA) has warned of this vulnerability, calling for immediate and necessary measures.

Mitigation Strategies

  • Update to tpm2 version 5.7 or later.
  • Implement strong authentication mechanisms to prevent unauthorized access to TPM devices.
  • Monitor for suspicious activity and investigate any anomalies promptly.
  • Regularly review and update security policies and procedures to address emerging threats.

Additional Information

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

No news found for this CVE

Social Media

CVE-2024-29039 tpm2 is the source repository for the Trusted Platform Module (TPM2.0) tools. This vulnerability allows attackers to manipulate tpm2_checkquote outputs by altering th… https://t.co/JjfjaGPCU2
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://github.com/tpm2-software/tpm2-tools/releases/tag/5.7
[email protected]https://github.com/tpm2-software/tpm2-tools/security/advisories/GHSA-8rjm-5f5f-h4q6
GITHUBhttps://github.com/tpm2-software/tpm2-tools/security/advisories/GHSA-8rjm-5f5f-h4q6

CWE Details

CWE IDCWE NameDescription
CWE-807Reliance on Untrusted Inputs in a Security DecisionThe application uses a protection mechanism that relies on the existence or values of an input, but the input can be modified by an untrusted actor in a way that bypasses the protection mechanism.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence