The security technology company Quarkslab has discovered two new vulnerabilities affecting TPM 2.0, the first of which enables memory access outside the controlled area during writing and the second during reading. The criticality of the two bugs is primarily due to the fact that both can be exploited even if an application is running with normal user rights (ie without admin rights). This creates an opportunity for malicious code to install software on the computer by bypassing the TPM 2.0 module.
Even according to conservative estimates, 2 billion devices may be affected, since TPM 2.0 is not only in desktop PCs and notebooks, but also in servers, IoT devices, etc. can also be found, and in the last 10 years it has become the most widespread hardware security solution on the market. For the time being, it seems that the vulnerability is not easy to deal with, if someone gets into the given device, then from then on “the way is clear”. The Trusted Computing Group, which oversees the TPM standard, has already published the procedure that can be used to remedy the vulnerabilities, and now it is the hardware manufacturers’ turn to improve their products based on this.
Source: geeks.hu