CVE-2020-8918

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-8918
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-8918.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-8918
Aliases
Related
Published
2020-08-11T19:15:17Z
Modified
2025-07-01T11:41:11.318175Z
Severity
  • 7.1 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
[none]
Details

An improperly initialized 'migrationAuth' value in Google's go-tpm TPM1.2 library versions prior to 0.3.0 can lead an eavesdropping attacker to discover the auth value for a key created with CreateWrapKey. An attacker listening in on the channel can collect both 'encUsageAuth' and 'encMigrationAuth', and then can calculate 'usageAuth ^ encMigrationAuth' as the 'migrationAuth' can be guessed for all keys created with CreateWrapKey. TPM2.0 is not impacted by this. We recommend updating your library to 0.3.0 or later, or, if you cannot update, to call CreateWrapKey with a random 20-byte value for 'migrationAuth'.

References

Affected packages

Git / github.com/google/go-tpm

Affected ranges

Type
GIT
Repo
https://github.com/google/go-tpm
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.0.1
v0.1.0
v0.1.1
v0.2.0