7.1
CVSSv3

CVE-2018-6622

Published: 17/08/2018 Updated: 03/10/2019
CVSS v2 Base Score: 3.6 | Impact Score: 4.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.1 | Impact Score: 5.2 | Exploitability Score: 1.8
VMScore: 321
Vector: AV:L/AC:L/Au:N/C:N/I:P/A:P

Vulnerability Summary

An issue exists that affects all producers of BIOS firmware who make a certain realistic interpretation of an obscure portion of the Trusted Computing Group (TCG) Trusted Platform Module (TPM) 2.0 specification. An abnormal case is not handled properly by this firmware while S3 sleep and can clear TPM 2.0. It allows local users to overwrite static PCRs of TPM and neutralize the security features of it, such as seal/unseal and remote attestation.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

trustedcomputinggroup trusted platform module 2.0

Vendor Advisories

Potential security vulnerabilities have been identified with the Trusted Platform Module (TPM) that allow an unauthorized third party to modify the TPM configuration following an S3 Resume, allowing unauthorized access to the system and its data ...
Potential security vulnerabilities have been identified with the Trusted Platform Module (TPM) that allow an unauthorized third party to modify the TPM configuration following an S3 Resume, allowing unauthorized access to the system and its data ...

Github Repositories

,║▒▒▒▒▒▒@╖ ╥▒▒╝ ▒▒▒╢ ]▒▒╢ ]▒▒╢ ]▒▒▒ j▒▒╢ , ,╖║▒▒▒ ,╓╖, ╓@╬@╥╥

TPM vulnerability checking tool for CVE-2018-6622. This tool will be published at Black Hat Asia 2019 and Black Hat Europe 2019

,----------------, ,---------, ,-----------------------, ," ,"| ," Napper v13 for TPM ," | ," ," | +-----------------------+ | ," ," | | -----------------Z | | +---------+ | | | Z |

,║▒▒▒▒▒▒@╖ ╥▒▒╝ ▒▒▒╢ ]▒▒╢ ]▒▒╢ ]▒▒▒ j▒▒╢ , ,╖║▒▒▒ ,╓╖, ╓@╬@╥╥