TPM-Fail: Now what?

Newsflash

Responsive image Trusted Platform Modules (TPMs)[1] are used in many (billions? of) desktop/embedded devices, mobile phones and tablets.
Why[2]?

  • ▪ TPMs replace hardware security modules (HSM) and smart cards
  • ▪ TPMs create a chain of trust - e.g. via programmable configuration registers (PCRs)
  • ▪ TPMs protect sealed keys - only avail. to processor if system is healthy
  • ▪ TPMs enable "strong" device identity - private/public key pairs stored in TPM
Now it looks like Trusted Platform Modules (TPMs) aren't so trustworthy after all.
A team of researchers discovered that they could quite easily extract private keys supposedly protected by TPMs made by Intel and STMicroelectronics via so called timing attacks, which they described as TPM-Fail[3].


What are the relevant CVEs and responses from chip manufacturers[3]?

  • ▪ CVE-2019-11090 for Intel fTPM vulnerabilitiesl[4]
    • Response: INTEL-SA-00241[5]
  • ▪ CVE-2019-16863 for STMicroelectronics TPM chipl[6]
    • Response: Information on ST's TPM firmware update[7]

[1] https://en.wikipedia.org/wiki/Trusted_Platform_Module
[2] http://blog.onboardsecurity.com/blog/trusted-computing-primary-use-cases
[3] http://tpm.fail/
[4] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11090
[5] https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html
[6] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16863
[7] https://www.st.com/content/st_com/en/campaigns/tpm-update.html