Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-15361 PoC — Infineon Trusted Platform Module Infineon RSA库安全漏洞

Source
Associated Vulnerability
Title:Infineon Trusted Platform Module Infineon RSA库安全漏洞 (CVE-2017-15361)
Description:Infineon Trusted Platform Module(TPM)是德国英飞凌(Infineon)科技公司的一款数据加密芯片。Infineon RSA library是其中的一个加密库。 Infineon TPM中的Infineon RSA库1.02.013版本中存在安全漏洞,该漏洞没有正确的处理RSA密钥的生成。攻击者可利用该漏洞破坏加密保护机制。以下版本受到影响:使用0000000000000422 - 4.34之前版本、000000000000062b - 6.43之前版本和00000000
Description
Simple PowerShell script to check whether a computer is using an Infineon TPM chip that is vulnerable to CVE-2017-15361.
Readme
# Infineon-CVE-2017-15361
Simple PowerShell script to check whether a computer is using an Infineon TPM chip that is vulnerable to CVE-2017-15361.

IMPORTANT: 
- THIS MUST BE EXECUTED AS ADMINISTRATOR!!
- This script only works on Windows 8.1 and Windows Server 2012 or later releases of Windows.

The script was reused from Microsoft: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV170012

More information about how you can test for the vulnerable can be found on https://www.vanstechelman.eu/content/testing-for-impact-of-infineons-vulnerable-rsa-generation-cve-2017-15361

Note: if the script doesn't work at first, you can try modifying the Windows PowerShell Script Execution Policy:
- To view which Powershell Execution Policy is currently applied, execute `Get-ExecutionPolicy`
- To change the Powershell Execution Policy to unrestricted, execute `Set-ExecutionPolicy unrestricted`
- To rollback and reset the policy to initial value, execute `Set-ExecutionPolicy <restricted|allsigned|remotesigned|unrestricted>`
File Snapshot

[4.0K] /data/pocs/216d3b723559d79ff63000c7132b689b8e77ba13 ├── [2.7K] IsInfineonFirmwareVersionAffected.ps1 └── [1.0K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.