Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49133: CWE-125: Out-of-bounds Read in stefanberger libtpms

0
Medium
VulnerabilityCVE-2025-49133cvecve-2025-49133cwe-125
Published: Tue Jun 10 2025 (06/10/2025, 19:46:27 UTC)
Source: CVE Database V5
Vendor/Project: stefanberger
Product: libtpms

Description

Libtpms is a library that targets the integration of TPM functionality into hypervisors, primarily into Qemu. Libtpms, which is derived from the TPM 2.0 reference implementation code published by the Trusted Computing Group, is prone to a potential out of bounds (OOB) read vulnerability. The vulnerability occurs in the ‘CryptHmacSign’ function with an inconsistent pairing of the signKey and signScheme parameters, where the signKey is ALG_KEYEDHASH key and inScheme is an ECC or RSA scheme. The reported vulnerability is in the ‘CryptHmacSign’ function, which is defined in the "Part 4: Supporting Routines – Code" document, section "7.151 - /tpm/src/crypt/CryptUtil.c ". This vulnerability can be triggered from user-mode applications by sending malicious commands to a TPM 2.0/vTPM (swtpm) whose firmware is based on an affected TCG reference implementation. The effect on libtpms is that it will cause an abort due to the detection of the out-of-bounds access, thus for example making a vTPM (swtpm) unavailable to a VM. This vulnerability is fixed in 0.7.12, 0.8.10, 0.9.7, and 0.10.1.

AI-Powered Analysis

AILast updated: 11/04/2025, 01:32:19 UTC

Technical Analysis

CVE-2025-49133 is an out-of-bounds (OOB) read vulnerability identified in the libtpms library, which is used to integrate TPM 2.0 functionality into hypervisors, primarily QEMU. Libtpms is derived from the Trusted Computing Group's TPM 2.0 reference implementation. The vulnerability occurs in the CryptHmacSign function, specifically when the signKey parameter is of type ALG_KEYEDHASH and the signScheme parameter is an ECC or RSA scheme, creating an inconsistent pairing. This mismatch leads to an out-of-bounds read in memory, which is detected by libtpms and causes the process to abort. This abort results in denial of service by making the virtual TPM (vTPM) instance unavailable to the guest virtual machine relying on it. The vulnerability can be triggered by user-mode applications that send crafted commands to a TPM 2.0 or virtual TPM (swtpm) firmware based on the affected TCG reference implementation. The affected versions of libtpms are 0.7.11, 0.8.9, 0.9.6, and 0.10.0, with fixes released in versions 0.7.12, 0.8.10, 0.9.7, and 0.10.1. The CVSS v3.1 score is 5.9 (medium severity), reflecting a local attack vector with low complexity, requiring privileges and user interaction, and causing availability impact without affecting confidentiality or integrity. No known exploits have been reported in the wild to date.

Potential Impact

For European organizations, the primary impact of CVE-2025-49133 is denial of service on virtual machines that rely on vTPM functionality provided by libtpms. This can disrupt security-sensitive operations that depend on TPM features such as secure key storage, attestation, and cryptographic operations within virtualized environments. Organizations using QEMU-based virtualization with vulnerable libtpms versions may experience VM outages or degraded security posture due to unavailable TPM services. This could affect sectors with high virtualization adoption such as cloud service providers, financial institutions, and government agencies. While the vulnerability does not expose sensitive data or allow privilege escalation, the loss of TPM availability can hinder compliance with security policies and impact trust in virtualized infrastructure. The requirement for local privileges and user interaction limits remote exploitation, but insider threats or compromised user accounts could trigger the vulnerability. Overall, the impact is moderate but significant for environments relying heavily on TPM-backed security in virtual machines.

Mitigation Recommendations

European organizations should immediately verify their use of libtpms in virtualization environments, particularly QEMU deployments with vTPM enabled. They must upgrade libtpms to fixed versions 0.7.12, 0.8.10, 0.9.7, or 0.10.1 as appropriate. Where upgrading is not immediately possible, organizations should restrict access to user accounts capable of interacting with the TPM interface to trusted personnel only, minimizing the risk of malicious command injection. Monitoring and alerting on abnormal TPM command usage or process aborts related to libtpms can help detect exploitation attempts. Additionally, organizations should review virtualization security policies to ensure that vTPM usage is justified and that fallback mechanisms exist in case of TPM unavailability. Employing strict privilege separation and limiting user interaction with TPM interfaces reduces the attack surface. Finally, coordinating with virtualization platform vendors to confirm integration of patched libtpms versions is critical for comprehensive mitigation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-06-02T10:39:41.633Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 684891ea48de16fa2fcfc18b

Added to database: 6/10/2025, 8:13:30 PM

Last enriched: 11/4/2025, 1:32:19 AM

Last updated: 11/22/2025, 9:02:34 PM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats