Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21444: CWE-327: Use of a Broken or Risky Cryptographic Algorithm in stefanberger libtpms

0
Medium
VulnerabilityCVE-2026-21444cvecve-2026-21444cwe-327cwe-330
Published: Fri Jan 02 2026 (01/02/2026, 19:05:31 UTC)
Source: CVE Database V5
Vendor/Project: stefanberger
Product: libtpms

Description

libtpms, a library that provides software emulation of a Trusted Platform Module, has a flaw in versions 0.10.0 and 0.10.1. The commonly used integration of libtpms with OpenSSL 3.x contained a vulnerability related to the returned IV (initialization vector) when certain symmetric ciphers were used. Instead of returning the last IV it returned the initial IV to the caller, thus weakening the subsequent encryption and decryption steps. The highest threat from this vulnerability is to data confidentiality. Version 0.10.2 fixes the issue. No known workarounds are available.

AI-Powered Analysis

AILast updated: 01/02/2026, 19:29:02 UTC

Technical Analysis

The vulnerability identified as CVE-2026-21444 affects libtpms, a software library that emulates Trusted Platform Module (TPM) functionality. Specifically, versions 0.10.0 and 0.10.1 of libtpms, when integrated with OpenSSL 3.x, exhibit a cryptographic flaw related to the handling of the initialization vector (IV) during symmetric encryption operations. Instead of returning the last IV used in the encryption process, libtpms erroneously returns the initial IV to the caller. This incorrect IV handling weakens the cryptographic strength of subsequent encryption and decryption steps, thereby compromising the confidentiality of the data processed by the library. The vulnerability is categorized under CWE-327 (Use of a Broken or Risky Cryptographic Algorithm) and CWE-330 (Use of Insufficiently Random Values). The flaw does not affect data integrity or availability, and exploitation requires local privileges with no user interaction needed. The vulnerability has a CVSS v3.1 base score of 5.5, indicating medium severity. The issue was resolved in libtpms version 0.10.2. No known workarounds are available, emphasizing the need for patching. No exploits have been reported in the wild to date.

Potential Impact

For European organizations, the primary impact of CVE-2026-21444 is the potential compromise of data confidentiality within environments that utilize libtpms for TPM emulation, especially where OpenSSL 3.x is employed. This could affect virtualized systems, secure boot processes, or cryptographic operations relying on TPM functionality. Confidential data protected by these cryptographic operations may be exposed or weakened, increasing the risk of data breaches or unauthorized data disclosure. Although the vulnerability requires local privileges, insider threats or attackers who have gained limited access could exploit it to weaken encryption protections. The absence of impact on integrity and availability reduces the risk of system disruption or data tampering. However, given the critical role of TPMs in hardware-based security, the vulnerability could undermine trust in security mechanisms, affecting compliance with European data protection regulations such as GDPR. Organizations in sectors with high security requirements, including finance, government, and critical infrastructure, may face increased risk if the vulnerability remains unpatched.

Mitigation Recommendations

European organizations should immediately upgrade libtpms to version 0.10.2 or later to remediate the vulnerability. Since no workarounds exist, patching is the only effective mitigation. Additionally, organizations should audit their environments to identify all instances of libtpms usage, particularly in virtualized or TPM-emulated systems integrated with OpenSSL 3.x. Implement strict access controls and monitoring to limit local privilege escalation opportunities, as exploitation requires local access. Review cryptographic configurations to ensure no legacy or weak cipher suites are in use that could compound the risk. Conduct thorough testing post-patching to verify that TPM-related cryptographic operations function correctly. Finally, maintain up-to-date asset inventories and vulnerability management processes to promptly address similar cryptographic issues in the future.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-29T03:00:29.276Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69581901db813ff03efbfeb4

Added to database: 1/2/2026, 7:14:09 PM

Last enriched: 1/2/2026, 7:29:02 PM

Last updated: 1/8/2026, 6:01:19 AM

Views: 82

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats