vulnerability
Microsoft Windows: CVE-2023-1017: CERT/CC: CVE-2023-1017 TPM2.0 Module Library Elevation of Privilege Vulnerability
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:S/C:C/I:C/A:C) | Mar 14, 2023 | Mar 14, 2023 | Jan 28, 2025 |
Severity
7
CVSS
(AV:L/AC:L/Au:S/C:C/I:C/A:C)
Published
Mar 14, 2023
Added
Mar 14, 2023
Modified
Jan 28, 2025
Description
An out-of-bounds write vulnerability exists in TPM2.0's Module Library allowing writing of a 2-byte data past the end of TPM2.0 command in the CryptParameterDecryption routine. An attacker who can successfully exploit this vulnerability can lead to denial of service (crashing the TPM chip/process or rendering it unusable) and/or arbitrary code execution in the TPM context.
Solution(s)
microsoft-windows-windows_10-1507-kb5023713microsoft-windows-windows_10-1607-kb5023697microsoft-windows-windows_10-1809-kb5023702microsoft-windows-windows_10-21h2-kb5023696microsoft-windows-windows_10-22h2-kb5023696microsoft-windows-windows_11-21h2-kb5023698microsoft-windows-windows_11-22h2-kb5023706microsoft-windows-windows_server_2016-1607-kb5023697microsoft-windows-windows_server_2019-1809-kb5023702microsoft-windows-windows_server_2022-21h2-kb5023705microsoft-windows-windows_server_2022-22h2-kb5023705
References
- CVE-2023-1017
- https://attackerkb.com/topics/CVE-2023-1017
- URL-https://support.microsoft.com/help/5023696
- URL-https://support.microsoft.com/help/5023697
- URL-https://support.microsoft.com/help/5023698
- URL-https://support.microsoft.com/help/5023702
- URL-https://support.microsoft.com/help/5023705
- URL-https://support.microsoft.com/help/5023706
- URL-https://support.microsoft.com/help/5023713

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.