FYI
Eclypsium, a security firm, recently discovered a vulnerability in the system-board firmware supporting the Trusted Platform Mode (TPM) for a
wide range of Intel processors.
- https://www.askwoody.com/newsletter/free-edition-finding-the-achilles-heel-of-tpm/
Eclypsium blog
- https://eclypsium.com/blog/ueficanhazbufferoverflow-widespread-impact-from-vulnerability-in-popular-pc-and-server-firmware/
There have been prior vulnerabilities in both 1.0 and 2.0 of TPM. This
one looks to be with the UEFI code calling TPM functions. If you don't
use Bitlocker, or some other feature of Windows that uses TPM, why not
just disable it in the BIOS?
Waste of time, if no one(besides you) else has physical access to the
device and the ability to exploit the weakness.
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 399 |
Nodes: | 16 (2 / 14) |
Uptime: | 121:33:37 |
Calls: | 8,375 |
Calls today: | 1 |
Files: | 13,165 |
Messages: | 5,899,967 |