AMD firmware-based TPM Compromised

simmerskool

Level 47
Thread author
Verified
Top Poster
Well-known
Forum Veteran
Apr 16, 2017
3,675
11,961
4,570
USA
Update, 3:15pm PT: AMD shared a comment on the new vulnerability disclosure, which we've added below.

Original Article, 9:16am PT : A new paper released by security researchers at the Technical University of Berlin reveals that AMD's firmware-based Trusted Platform Module (fTPM / TPM) can be fully compromised via a voltage fault injection attack, thus allowing full access to the cryptographic data held inside the fTPM in an attack called 'faulTPM.' Ultimately this allows an attacker to fully compromise any application or encryption, like BitLocker, that relies solely upon TPM-based security.
 
Last edited by a moderator:
Well it is software TPM, it was intended to be used as a backup, but everyone uses it as a main TPM, though it is causing many problems, this is just another one and it is not the last one.
 
So, INTEL is safe

Quote from article

According to the researchers, Intel's Converged Security and Manageability Engine (CSME) prevents these types of attacks.

Unquote

😁
 
Last edited:
  • Like
Reactions: Gandalf_The_Grey