First published: Mon Jan 03 2022(Updated: )
A BIOS bug in firmware for a particular PC model leaves the Platform authorization value empty. This can be used to permanently brick the TPM in multiple ways, as well as to non-permanently DoS the system.
Credit: infosec@edk2.groups.io
Affected Software | Affected Version | How to fix |
---|---|---|
Tianocore EDK II | =201808 | |
Tianocore EDK II | =201811 | |
Tianocore EDK II | =201903 | |
Tianocore EDK II | =201905 | |
Tianocore EDK II | =201908 | |
Tianocore EDK II | =201911 | |
Tianocore EDK II | =202002 | |
Tianocore EDK II | =202005 | |
Tianocore EDK II | =202008 | |
Tianocore EDK II | =202011 | |
Tianocore EDK II | =202102 | |
Tianocore EDK II | =202105 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this BIOS bug is CVE-2021-38576.
The severity level of CVE-2021-38576 is high with a CVSS score of 7.5.
This BIOS bug can be used to permanently brick the TPM in multiple ways and can also non-permanently DoS the system.
This BIOS bug affects a particular PC model.
Please refer to the reference link for information on available fixes for CVE-2021-38576.