CVE-2020-8918

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-8918
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-8918.json
Aliases
Published
2020-08-11T19:15:17Z
Modified
2023-11-29T08:39:13.008091Z
Details

An improperly initialized 'migrationAuth' value in Google's go-tpm TPM1.2 library versions prior to 0.3.0 can lead an eavesdropping attacker to discover the auth value for a key created with CreateWrapKey. An attacker listening in on the channel can collect both 'encUsageAuth' and 'encMigrationAuth', and then can calculate 'usageAuth ^ encMigrationAuth' as the 'migrationAuth' can be guessed for all keys created with CreateWrapKey. TPM2.0 is not impacted by this. We recommend updating your library to 0.3.0 or later, or, if you cannot update, to call CreateWrapKey with a random 20-byte value for 'migrationAuth'.

References

Affected packages

Git / github.com/google/go-tpm

Affected ranges

Type
GIT
Repo
https://github.com/google/go-tpm
Events
Introduced
0The exact introduced commit is unknown
Fixed

Affected versions

v0.*

v0.0.1
v0.1.0
v0.1.1
v0.2.0