First published: Tue Nov 29 2022(Updated: )
A out-of-bounds read vulnerability exists in TPM2.0's Module Library allowing a 2-byte read past the end of a TPM2.0 command in the CryptParameterDecryption routine. An attacker who can successfully exploit this vulnerability can sensitive data stored in the TPM.
Credit: cret@cert.org cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 10 | =20H2 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =22H2 | |
Microsoft Windows 10 | ||
Microsoft Windows 10 | =1607 | |
Microsoft Windows 10 | =21H2 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | ||
Trusted Computing Group Trusted Platform Module (TPM) | =2.0-revision_1.16 | |
Trusted Computing Group Trusted Platform Module (TPM) | =2.0-revision_1.38 | |
Trusted Computing Group Trusted Platform Module (TPM) | =2.0-revision_1.59 | |
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2019 | ||
Windows 11 | =22H2 | |
Windows 11 | =21H2 | |
Microsoft Windows Server 2022 | ||
Microsoft Windows Server 2022 | ||
Microsoft Windows 10 | <10.0.10240.19805 | |
Microsoft Windows 10 | <10.0.14393.5786 | |
Microsoft Windows 10 | <10.0.17763.4131 | |
Microsoft Windows 10 | <10.0.19042.2728 | |
Microsoft Windows 10 | <10.0.19044.2728 | |
Microsoft Windows 10 | <10.0.19045.2728 | |
Windows 11 | <10.0.22000.1696 | |
Windows 11 | <10.0.22621.1413 | |
Microsoft Windows Server 2016 | <10.0.14393.5786 | |
Microsoft Windows Server 2019 | <10.0.17763.4131 | |
Microsoft Windows Server 2022 | <10.0.20348.1607 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-1018 is an out-of-bounds read vulnerability in TPM2.0's Module Library, allowing unauthorized access to sensitive data stored in the TPM.
CVE-2023-1018 has a severity score of 8.8, indicating a critical vulnerability.
Windows 11 (21H2 and 22H2), Windows Server 2022, Windows Server 2019, Windows Server 2016, and Windows 10 (all versions) are affected by CVE-2023-1018.
You can patch CVE-2023-1018 by applying the appropriate security update from Microsoft or Trusted Computing Group, depending on the affected software.
You can find more information about CVE-2023-1018 on the Microsoft Security Response Center (MSRC) website, Bugzilla, and Red Hat advisory.