漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
TPM 1.2 key authorization values are vulnerable to a TPM transport eavesdropper
Vulnerability Description
An improperly initialized 'migrationAuth' value in Google's go-tpm TPM1.2 library versions prior to 0.3.0 can lead an eavesdropping attacker to discover the auth value for a key created with CreateWrapKey. An attacker listening in on the channel can collect both 'encUsageAuth' and 'encMigrationAuth', and then can calculate 'usageAuth ^ encMigrationAuth' as the 'migrationAuth' can be guessed for all keys created with CreateWrapKey. TPM2.0 is not impacted by this. We recommend updating your library to 0.3.0 or later, or, if you cannot update, to call CreateWrapKey with a random 20-byte value for 'migrationAuth'.
CVSS Information
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
Vulnerability Type
初始化不恰当
Vulnerability Title
Google Go-TPM 安全漏洞
Vulnerability Description
Google Go-TPM是美国Google公司的一个 Go 开发包,能够在 Linux 平台上直接与 TPM 通信 。TPM 规范中指定的格式能够直接通过缓冲区进行通信 。 go-tpm 0.3.0之前版本中存在安全漏洞,该漏洞源于程序没有正确初始化‘migrationAuth’值。攻击者可利用该漏洞获取CreateWrapKey创建的密钥的auth值。
CVSS Information
N/A
Vulnerability Type
N/A