The Trusted Platform Module (TPM) 2.0 specification, a hardware-based technology used to provide tamper-resistant secure cryptographic functions, is affected by two buffer overflow vulnerabilities. These vulnerabilities could allow attackers to access or overwrite sensitive data, such as cryptographic keys.
Get through updates and upcoming events, and more directly in your inbox