Trusted Computing Group’s Trust Platform Module 2.0 reference library specification has been discovered with two buffer overflow vulnerabilities that threat actors can exploit to access read-only sensitive data or overwrite normally protected data, which is only available to the TPM. A malicious individual who has gained access to the TPM 2.0’s Command interface has the […]
The post Buffer Overflow Flaws in Trusted Platform Modules Allow Malicious Commands appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.
This article has been indexed from GBHackers on Security | #1 Globally Trusted Cyber Security News Platform