Buffer overflow vulnerabilities were discovered recently in TPM 2 implementations.
Related article here : https://kb.cert.org/vuls/id/782720
TPM 2 (Trusted Platform Module) is the latest version of this hardware security technology.
More info on TPM here : https://learn.microsoft.com/en-us/windows/security/information-protection/tpm/trusted-platform-module-overview
On a high level description, this security technology involves hardware encryption for sensitive data used in a computer (logins – passwords – encryption / decryption certificates etc.) , and has also physical design and implementation requirements, to protect data communications between this module and the rest of the motherboard of a computer (buses layout – motherboard layout etc.).
TPM 2 vulnerabilities discovered
by
Tags: