First published: Tue Jun 27 2017(Updated: )
tpm2-tools versions before 1.1.1 are vulnerable to a password leak due to transmitting password in plaintext from client to server when generating HMAC.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
tpm2-tools | <=1.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7524 has a high severity rating due to the risk of password leaks during plaintext transmission.
You can fix CVE-2017-7524 by upgrading tpm2-tools to version 1.1.1 or later.
CVE-2017-7524 exposes a vulnerability that allows passwords to be transmitted in plaintext, potentially leading to unauthorized access.
CVE-2017-7524 affects all versions of tpm2-tools before 1.1.1.
Yes, CVE-2017-7524 is specifically related to the insecure handling of passwords during HMAC generation.