Vulnerability Description
tpm2-tss is an open source software implementation of the Trusted Computing Group (TCG) Trusted Platform Module (TPM) 2 Software Stack (TSS2). In versions prior to 4.1.0-rc0, 4.0.1, and 3.2.2-rc1, `Tss2_RC_SetHandler` and `Tss2_RC_Decode` both index into `layer_handler` with an 8 bit layer number, but the array only has `TPM2_ERROR_TSS2_RC_LAYER_COUNT` entries, so trying to add a handler for higher-numbered layers or decode a response code with such a layer number reads/writes past the end of the buffer. This Buffer overrun, could result in arbitrary code execution. An example attack would be a MiTM bus attack that returns 0xFFFFFFFF for the RC. Given the common use case of TPM modules an attacker must have local access to the target machine with local system privileges which allows access to the TPM system. Usually TPM access requires administrative privilege. Versions 4.1.0-rc0, 4.0.1, and 3.2.2-rc1 fix the issue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tpm2 Software Stack Project | Tpm2 Software Stack | < 3.2.2 |
Related Weaknesses (CWE)
References
- https://github.com/tpm2-software/tpm2-tss/commit/306490c8d848c367faa2d9df81f5e69PatchThird Party Advisory
- https://github.com/tpm2-software/tpm2-tss/commit/49107d65d5c7be430671398416bbd89
- https://github.com/tpm2-software/tpm2-tss/commit/7ab42953216adec046d000a5e3085f3
- https://github.com/tpm2-software/tpm2-tss/security/advisories/GHSA-4j3v-fh23-vx6ExploitThird Party Advisory
- https://github.com/tpm2-software/tpm2-tss/commit/306490c8d848c367faa2d9df81f5e69PatchThird Party Advisory
- https://github.com/tpm2-software/tpm2-tss/security/advisories/GHSA-4j3v-fh23-vx6ExploitThird Party Advisory
FAQ
What is CVE-2023-22745?
CVE-2023-22745 is a vulnerability with a CVSS score of 6.4 (MEDIUM). tpm2-tss is an open source software implementation of the Trusted Computing Group (TCG) Trusted Platform Module (TPM) 2 Software Stack (TSS2). In versions prior to 4.1.0-rc0, 4.0.1, and 3.2.2-rc1, `Ts...
How severe is CVE-2023-22745?
CVE-2023-22745 has been rated MEDIUM with a CVSS base score of 6.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-22745?
Check the references section above for vendor advisories and patch information. Affected products include: Tpm2 Software Stack Project Tpm2 Software Stack.