CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
EPSS
Percentile
21.7%
A flaw was found in libtpms in versions before 0.8.0. The TPM 2
implementation returns 2048 bit keys with ~1984 bit strength due to a bug
in the TCG specification. The bug is in the key creation algorithm in
RsaAdjustPrimeCandidate(), which is called before the prime number check.
The highest threat from this vulnerability is to data confidentiality.
bugzilla.redhat.com/show_bug.cgi?id=1950046
github.com/stefanberger/libtpms/commit/625171be0c8225824740b5d0fb7e8562f6a1c6a8 (v0.8.0)
github.com/stefanberger/libtpms/commit/c1f7bf55099fcd427715aa65e130475c6e836a6b (v0.8.0)
github.com/stefanberger/libtpms/issues/183
launchpad.net/bugs/cve/CVE-2021-3505
nvd.nist.gov/vuln/detail/CVE-2021-3505
security-tracker.debian.org/tracker/CVE-2021-3505
www.cve.org/CVERecord?id=CVE-2021-3505
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
EPSS
Percentile
21.7%