CVE-2025-49133: CWE-125: Out-of-bounds Read in stefanberger libtpms
Libtpms is a library that targets the integration of TPM functionality into hypervisors, primarily into Qemu. Libtpms, which is derived from the TPM 2.0 reference implementation code published by the Trusted Computing Group, is prone to a potential out of bounds (OOB) read vulnerability. The vulnerability occurs in the ‘CryptHmacSign’ function with an inconsistent pairing of the signKey and signScheme parameters, where the signKey is ALG_KEYEDHASH key and inScheme is an ECC or RSA scheme. The reported vulnerability is in the ‘CryptHmacSign’ function, which is defined in the "Part 4: Supporting Routines – Code" document, section "7.151 - /tpm/src/crypt/CryptUtil.c ". This vulnerability can be triggered from user-mode applications by sending malicious commands to a TPM 2.0/vTPM (swtpm) whose firmware is based on an affected TCG reference implementation. The effect on libtpms is that it will cause an abort due to the detection of the out-of-bounds access, thus for example making a vTPM (swtpm) unavailable to a VM. This vulnerability is fixed in 0.7.12, 0.8.10, 0.9.7, and 0.10.1.
AI Analysis
Technical Summary
CVE-2025-49133 is an out-of-bounds (OOB) read vulnerability identified in the libtpms library, which is used to integrate TPM 2.0 functionality into hypervisors, primarily QEMU. Libtpms is derived from the Trusted Computing Group's TPM 2.0 reference implementation. The vulnerability occurs in the CryptHmacSign function, specifically when the signKey parameter is of type ALG_KEYEDHASH and the signScheme parameter is an ECC or RSA scheme, creating an inconsistent pairing. This mismatch leads to an out-of-bounds read in memory, which is detected by libtpms and causes the process to abort. This abort results in denial of service by making the virtual TPM (vTPM) instance unavailable to the guest virtual machine relying on it. The vulnerability can be triggered by user-mode applications that send crafted commands to a TPM 2.0 or virtual TPM (swtpm) firmware based on the affected TCG reference implementation. The affected versions of libtpms are 0.7.11, 0.8.9, 0.9.6, and 0.10.0, with fixes released in versions 0.7.12, 0.8.10, 0.9.7, and 0.10.1. The CVSS v3.1 score is 5.9 (medium severity), reflecting a local attack vector with low complexity, requiring privileges and user interaction, and causing availability impact without affecting confidentiality or integrity. No known exploits have been reported in the wild to date.
Potential Impact
For European organizations, the primary impact of CVE-2025-49133 is denial of service on virtual machines that rely on vTPM functionality provided by libtpms. This can disrupt security-sensitive operations that depend on TPM features such as secure key storage, attestation, and cryptographic operations within virtualized environments. Organizations using QEMU-based virtualization with vulnerable libtpms versions may experience VM outages or degraded security posture due to unavailable TPM services. This could affect sectors with high virtualization adoption such as cloud service providers, financial institutions, and government agencies. While the vulnerability does not expose sensitive data or allow privilege escalation, the loss of TPM availability can hinder compliance with security policies and impact trust in virtualized infrastructure. The requirement for local privileges and user interaction limits remote exploitation, but insider threats or compromised user accounts could trigger the vulnerability. Overall, the impact is moderate but significant for environments relying heavily on TPM-backed security in virtual machines.
Mitigation Recommendations
European organizations should immediately verify their use of libtpms in virtualization environments, particularly QEMU deployments with vTPM enabled. They must upgrade libtpms to fixed versions 0.7.12, 0.8.10, 0.9.7, or 0.10.1 as appropriate. Where upgrading is not immediately possible, organizations should restrict access to user accounts capable of interacting with the TPM interface to trusted personnel only, minimizing the risk of malicious command injection. Monitoring and alerting on abnormal TPM command usage or process aborts related to libtpms can help detect exploitation attempts. Additionally, organizations should review virtualization security policies to ensure that vTPM usage is justified and that fallback mechanisms exist in case of TPM unavailability. Employing strict privilege separation and limiting user interaction with TPM interfaces reduces the attack surface. Finally, coordinating with virtualization platform vendors to confirm integration of patched libtpms versions is critical for comprehensive mitigation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-49133: CWE-125: Out-of-bounds Read in stefanberger libtpms
Description
Libtpms is a library that targets the integration of TPM functionality into hypervisors, primarily into Qemu. Libtpms, which is derived from the TPM 2.0 reference implementation code published by the Trusted Computing Group, is prone to a potential out of bounds (OOB) read vulnerability. The vulnerability occurs in the ‘CryptHmacSign’ function with an inconsistent pairing of the signKey and signScheme parameters, where the signKey is ALG_KEYEDHASH key and inScheme is an ECC or RSA scheme. The reported vulnerability is in the ‘CryptHmacSign’ function, which is defined in the "Part 4: Supporting Routines – Code" document, section "7.151 - /tpm/src/crypt/CryptUtil.c ". This vulnerability can be triggered from user-mode applications by sending malicious commands to a TPM 2.0/vTPM (swtpm) whose firmware is based on an affected TCG reference implementation. The effect on libtpms is that it will cause an abort due to the detection of the out-of-bounds access, thus for example making a vTPM (swtpm) unavailable to a VM. This vulnerability is fixed in 0.7.12, 0.8.10, 0.9.7, and 0.10.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-49133 is an out-of-bounds (OOB) read vulnerability identified in the libtpms library, which is used to integrate TPM 2.0 functionality into hypervisors, primarily QEMU. Libtpms is derived from the Trusted Computing Group's TPM 2.0 reference implementation. The vulnerability occurs in the CryptHmacSign function, specifically when the signKey parameter is of type ALG_KEYEDHASH and the signScheme parameter is an ECC or RSA scheme, creating an inconsistent pairing. This mismatch leads to an out-of-bounds read in memory, which is detected by libtpms and causes the process to abort. This abort results in denial of service by making the virtual TPM (vTPM) instance unavailable to the guest virtual machine relying on it. The vulnerability can be triggered by user-mode applications that send crafted commands to a TPM 2.0 or virtual TPM (swtpm) firmware based on the affected TCG reference implementation. The affected versions of libtpms are 0.7.11, 0.8.9, 0.9.6, and 0.10.0, with fixes released in versions 0.7.12, 0.8.10, 0.9.7, and 0.10.1. The CVSS v3.1 score is 5.9 (medium severity), reflecting a local attack vector with low complexity, requiring privileges and user interaction, and causing availability impact without affecting confidentiality or integrity. No known exploits have been reported in the wild to date.
Potential Impact
For European organizations, the primary impact of CVE-2025-49133 is denial of service on virtual machines that rely on vTPM functionality provided by libtpms. This can disrupt security-sensitive operations that depend on TPM features such as secure key storage, attestation, and cryptographic operations within virtualized environments. Organizations using QEMU-based virtualization with vulnerable libtpms versions may experience VM outages or degraded security posture due to unavailable TPM services. This could affect sectors with high virtualization adoption such as cloud service providers, financial institutions, and government agencies. While the vulnerability does not expose sensitive data or allow privilege escalation, the loss of TPM availability can hinder compliance with security policies and impact trust in virtualized infrastructure. The requirement for local privileges and user interaction limits remote exploitation, but insider threats or compromised user accounts could trigger the vulnerability. Overall, the impact is moderate but significant for environments relying heavily on TPM-backed security in virtual machines.
Mitigation Recommendations
European organizations should immediately verify their use of libtpms in virtualization environments, particularly QEMU deployments with vTPM enabled. They must upgrade libtpms to fixed versions 0.7.12, 0.8.10, 0.9.7, or 0.10.1 as appropriate. Where upgrading is not immediately possible, organizations should restrict access to user accounts capable of interacting with the TPM interface to trusted personnel only, minimizing the risk of malicious command injection. Monitoring and alerting on abnormal TPM command usage or process aborts related to libtpms can help detect exploitation attempts. Additionally, organizations should review virtualization security policies to ensure that vTPM usage is justified and that fallback mechanisms exist in case of TPM unavailability. Employing strict privilege separation and limiting user interaction with TPM interfaces reduces the attack surface. Finally, coordinating with virtualization platform vendors to confirm integration of patched libtpms versions is critical for comprehensive mitigation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-06-02T10:39:41.633Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 684891ea48de16fa2fcfc18b
Added to database: 6/10/2025, 8:13:30 PM
Last enriched: 11/4/2025, 1:32:19 AM
Last updated: 11/22/2025, 9:02:34 PM
Views: 39
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services
MediumCVE-2025-2655: SQL Injection in SourceCodester AC Repair and Services System
MediumCVE-2023-30806: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sangfor Net-Gen Application Firewall
CriticalCVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.