CVE-2021-3505Insufficient Entropy in Project Libtpms

Severity
5.5MEDIUMNVD
EPSS
0.1%
top 68.03%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 19
Latest updateMay 24

Description

A flaw was found in libtpms in versions before 0.8.0. The TPM 2 implementation returns 2048 bit keys with ~1984 bit strength due to a bug in the TCG specification. The bug is in the key creation algorithm in RsaAdjustPrimeCandidate(), which is called before the prime number check. The highest threat from this vulnerability is to data confidentiality.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

Debianlibtpms_project/libtpms< 0.8.0~dev1-1+2
CVEListV5libtpms_project/libtpmslibtpms 0.8.0

Also affects: Fedora 33, Enterprise Linux 8.0

Patches

🔴Vulnerability Details

3
GHSA
GHSA-239j-gmhr-4pcm: A flaw was found in libtpms in versions before 02022-05-24
CVEList
CVE-2021-3505: A flaw was found in libtpms in versions before 02021-04-19
OSV
CVE-2021-3505: A flaw was found in libtpms in versions before 02021-04-19

📋Vendor Advisories

2
Debian
CVE-2021-3505: libtpms - A flaw was found in libtpms in versions before 0.8.0. The TPM 2 implementation r...2021
Red Hat
libtpms: RSA keys weaker than expected2020-04-14
CVE-2021-3505 — Insufficient Entropy in Project Libtpms | cvebase