Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2024-29038
Modified
More InfoOfficial Page
Source-security-advisories@github.com
View Known Exploited Vulnerability (KEV) details
Published At-28 Jun, 2024 | 14:15
Updated At-04 Nov, 2025 | 18:16

tpm2-tools is the source repository for the Trusted Platform Module (TPM2.0) tools. A malicious attacker can generate arbitrary quote data which is not detected by `tpm2 checkquote`. This issue was patched in version 5.7.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.14.3MEDIUM
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
Primary3.13.3LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 4.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
Type: Primary
Version: 3.1
Base score: 3.3
Base severity: LOW
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CPE Matches

tpm2-tools_project
tpm2-tools_project
>>tpm2-tools>>Versions from 4.1(inclusive) to 5.5.1(exclusive)
cpe:2.3:a:tpm2-tools_project:tpm2-tools:*:*:*:*:*:*:*:*
tpm2-tools_project
tpm2-tools_project
>>tpm2-tools>>Versions between 5.6.1(exclusive) and 5.7(exclusive)
cpe:2.3:a:tpm2-tools_project:tpm2-tools:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-1283Secondarysecurity-advisories@github.com
CWE-1390Secondarysecurity-advisories@github.com
CWE ID: CWE-1283
Type: Secondary
Source: security-advisories@github.com
CWE ID: CWE-1390
Type: Secondary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/tpm2-software/tpm2-tools/releases/tag/5.7security-advisories@github.com
Release Notes
https://github.com/tpm2-software/tpm2-tools/security/advisories/GHSA-5495-c38w-gr6fsecurity-advisories@github.com
Exploit
Vendor Advisory
https://github.com/tpm2-software/tpm2-tools/releases/tag/5.7af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://github.com/tpm2-software/tpm2-tools/security/advisories/GHSA-5495-c38w-gr6faf854a3a-2127-422b-91ae-364da2661108
Exploit
Vendor Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFR7SVEWCOXORHPCLLGXEMHFMIGG2MFE/af854a3a-2127-422b-91ae-364da2661108
N/A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GI4JFEZBKQQUPJ4RWK6IHEWXAFCEJDPI/af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: https://github.com/tpm2-software/tpm2-tools/releases/tag/5.7
Source: security-advisories@github.com
Resource:
Release Notes
Hyperlink: https://github.com/tpm2-software/tpm2-tools/security/advisories/GHSA-5495-c38w-gr6f
Source: security-advisories@github.com
Resource:
Exploit
Vendor Advisory
Hyperlink: https://github.com/tpm2-software/tpm2-tools/releases/tag/5.7
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://github.com/tpm2-software/tpm2-tools/security/advisories/GHSA-5495-c38w-gr6f
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Vendor Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFR7SVEWCOXORHPCLLGXEMHFMIGG2MFE/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GI4JFEZBKQQUPJ4RWK6IHEWXAFCEJDPI/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Change History
0Changes found

Details not found