Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-29038: CWE-1283: Mutable Attestation or Measurement Reporting Data in tpm2-software tpm2-tools

0
Medium
VulnerabilityCVE-2024-29038cvecve-2024-29038cwe-1283cwe-1390
Published: Fri Jun 28 2024 (06/28/2024, 13:44:07 UTC)
Source: CVE Database V5
Vendor/Project: tpm2-software
Product: tpm2-tools

Description

tpm2-tools is the source repository for the Trusted Platform Module (TPM2.0) tools. A malicious attacker can generate arbitrary quote data which is not detected by `tpm2 checkquote`. This issue was patched in version 5.7.

AI-Powered Analysis

AILast updated: 11/04/2025, 17:55:15 UTC

Technical Analysis

CVE-2024-29038 is a vulnerability classified under CWE-1283 (Mutable Attestation or Measurement Reporting Data) and CWE-1390 affecting the tpm2-tools software suite, which provides command-line utilities to interact with TPM 2.0 hardware modules. TPM (Trusted Platform Module) is widely used to provide hardware-based security functions, including platform integrity attestation via cryptographic quotes. The vulnerability allows a malicious actor with local access to craft arbitrary quote data that bypasses detection by the tpm2 checkquote utility, which is designed to verify the authenticity and integrity of TPM quotes. This means that an attacker can present falsified attestation data, potentially misleading systems or administrators relying on TPM quotes for security decisions such as secure boot validation, measured boot, or remote attestation. The flaw affects all versions of tpm2-tools starting from 4.1-rc0 up to but excluding 5.7, where the issue has been fixed. The CVSS v3.1 base score is 4.3 (medium severity), reflecting that exploitation requires local access but no privileges or user interaction, and the impact is limited to confidentiality (partial loss of trust in attestation data) without affecting integrity or availability of the system directly. No known exploits have been reported in the wild as of the publication date. The vulnerability highlights the importance of ensuring that TPM quote verification tools themselves are secure and trustworthy, as they form a critical part of the chain of trust in platform security.

Potential Impact

For European organizations, the impact of CVE-2024-29038 lies primarily in the potential undermining of TPM-based attestation processes. Many enterprises, government agencies, and critical infrastructure operators in Europe rely on TPM 2.0 for secure boot, measured boot, and remote attestation to ensure platform integrity and compliance with security policies. If an attacker can generate arbitrary quote data undetected, it could allow bypassing security controls that depend on TPM attestation, potentially enabling stealthy persistence or unauthorized changes to critical systems. Although exploitation requires local access, insider threats or attackers who have already gained limited footholds could leverage this vulnerability to evade detection. This risk is particularly relevant for sectors with stringent security requirements such as finance, healthcare, energy, and government. However, since the vulnerability does not allow privilege escalation or direct system compromise, the overall risk is moderate. The absence of known exploits reduces immediate threat levels but does not eliminate the need for remediation.

Mitigation Recommendations

European organizations should immediately upgrade all instances of tpm2-tools to version 5.7 or later, where the vulnerability has been patched. Since exploitation requires local access, organizations should also enforce strict access controls and monitoring on systems with TPM-enabled attestation, limiting user privileges and employing robust endpoint detection and response (EDR) solutions to detect suspicious local activities. Regularly auditing TPM quote verification processes and logs can help identify anomalies indicative of tampering attempts. For environments relying on remote attestation, implementing additional layers of verification beyond TPM quotes, such as behavioral analytics or hardware-based attestation extensions, can reduce reliance on a single point of failure. Security teams should also ensure that firmware and TPM microcode are up to date, as vulnerabilities in TPM hardware or firmware could compound risks. Finally, integrating vulnerability management processes to track and promptly apply updates to security-critical tools like tpm2-tools is essential to maintain platform trustworthiness.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2024-03-14T16:59:47.613Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a3b69ff58c9332ff0a5d4

Added to database: 11/4/2025, 5:44:09 PM

Last enriched: 11/4/2025, 5:55:15 PM

Last updated: 12/20/2025, 11:11:11 AM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats