First published: Tue May 25 2021(Updated: )
A flaw was found in tpm2-tools in versions before 5.1.1 and before 4.3.2. tpm2_import used a fixed AES key for the inner wrapper, potentially allowing a MITM attacker to unwrap the inner portion and reveal the key being imported. The highest threat from this vulnerability is to data confidentiality.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/tpm2-tools | <5.1.1 | 5.1.1 |
redhat/tpm2-tools | <4.3.2 | 4.3.2 |
Array-tools | <4.3.2 | |
Array-tools | >=5.1<5.1.1 | |
Red Hat Enterprise Linux | =8.0 | |
Fedora | =33 | |
Fedora | =34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3565 has a high severity rating due to its potential impact on data confidentiality.
To fix CVE-2021-3565, upgrade tpm2-tools to version 5.1.1 or above if using the 5.x series, or to version 4.3.2 if using the 4.x series.
tpm2-tools versions before 5.1.1 and 4.3.2 are affected by CVE-2021-3565.
CVE-2021-3565 potentially allows a man-in-the-middle (MITM) attacker to unwrap the inner portion and reveal the key being imported.
No specific workarounds are recommended for CVE-2021-3565; updating to the fixed versions is the best approach.