Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-2884
PUBLISHED
More InfoOfficial Page
Assigner-certcc
Assigner Org ID-37e5125f-f79b-445b-8fad-9564f167944b
View Known Exploited Vulnerability (KEV) details
Published At-10 Jun, 2025 | 17:29
Updated At-13 Jun, 2025 | 18:22
Rejected At-
▼CVE Numbering Authority (CNA)
Out-of-Bounds read vulnerability in TCG TPM2.0 reference implementation

TCG TPM2.0 Reference implementation's CryptHmacSign helper function is vulnerable to Out-of-Bounds read due to the lack of validation the signature scheme with the signature key's algorithm. See Errata Revision 1.83 and advisory TCGVRT0009 for TCG standard TPM2.0

Affected Products
Vendor
Trusted Computing Group
Product
TPM2.0
Versions
Affected
  • From 0 before 1.83 (custom)
Problem Types
TypeCWE IDDescription
N/AN/ACWE-125 Out-of-bounds Read
Type: N/A
CWE ID: N/A
Description: CWE-125 Out-of-bounds Read
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
ssvcV1_0_1
id:
CVE-2025-2884
timestamp:
2025-06-13T17:22:30.584Z
selections:
name:
Exploitation
values:
none
version:
1.0.0
namespace:
ssvc
name:
Automatable
values:
no
version:
2.0.0
namespace:
ssvc
name:
Technical Impact
values:
partial
version:
1.0.0
namespace:
ssvc
name:
Mission & Well-being
values:
medium
version:
1.0.0
namespace:
ssvc
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://trustedcomputinggroup.org/about/security/
N/A
https://trustedcomputinggroup.org/wp-content/uploads/TPM2.0-Library-Spec-v1.83-Errata_v1_pub.pdf
N/A
https://trustedcomputinggroup.org/wp-content/uploads/VRT0009-Advisory-FINAL.pdf
N/A
https://github.com/stefanberger/libtpms/commit/04b2d8e9afc0a9b6bffe562a23e58c0de11532d1
N/A
https://www.cve.org/CVERecord?id=CVE-2025-49133
N/A
Hyperlink: https://trustedcomputinggroup.org/about/security/
Resource: N/A
Hyperlink: https://trustedcomputinggroup.org/wp-content/uploads/TPM2.0-Library-Spec-v1.83-Errata_v1_pub.pdf
Resource: N/A
Hyperlink: https://trustedcomputinggroup.org/wp-content/uploads/VRT0009-Advisory-FINAL.pdf
Resource: N/A
Hyperlink: https://github.com/stefanberger/libtpms/commit/04b2d8e9afc0a9b6bffe562a23e58c0de11532d1
Resource: N/A
Hyperlink: https://www.cve.org/CVERecord?id=CVE-2025-49133
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01209.html
N/A
https://www.kb.cert.org/vuls/id/282450
N/A
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01209.html
Resource: N/A
Hyperlink: https://www.kb.cert.org/vuls/id/282450
Resource: N/A
2. CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-125CWE-125 Out-of-bounds Read
Type: CWE
CWE ID: CWE-125
Description: CWE-125 Out-of-bounds Read
Metrics
VersionBase scoreBase severityVector
3.16.6MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H
Version: 3.1
Base score: 6.6
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found