Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21444: CWE-327: Use of a Broken or Risky Cryptographic Algorithm in stefanberger libtpms

0
Medium
VulnerabilityCVE-2026-21444cvecve-2026-21444cwe-327cwe-330
Published: Fri Jan 02 2026 (01/02/2026, 19:05:31 UTC)
Source: CVE Database V5
Vendor/Project: stefanberger
Product: libtpms

Description

libtpms, a library that provides software emulation of a Trusted Platform Module, has a flaw in versions 0.10.0 and 0.10.1. The commonly used integration of libtpms with OpenSSL 3.x contained a vulnerability related to the returned IV (initialization vector) when certain symmetric ciphers were used. Instead of returning the last IV it returned the initial IV to the caller, thus weakening the subsequent encryption and decryption steps. The highest threat from this vulnerability is to data confidentiality. Version 0.10.2 fixes the issue. No known workarounds are available.

AI-Powered Analysis

AILast updated: 01/09/2026, 21:21:02 UTC

Technical Analysis

CVE-2026-21444 affects libtpms, a software library that emulates Trusted Platform Module (TPM) functionality, specifically in versions 0.10.0 and 0.10.1. The vulnerability arises from improper handling of the initialization vector (IV) in cryptographic operations when libtpms is integrated with OpenSSL 3.x. Instead of returning the last IV used in symmetric cipher operations, libtpms erroneously returns the initial IV to the caller. This behavior undermines the cryptographic strength of the encryption and decryption processes, leading to weakened data confidentiality. The flaw is categorized under CWE-327 (Use of a Broken or Risky Cryptographic Algorithm) and CWE-330 (Use of Insufficiently Random Values). Exploitation requires local access with low privileges and does not require user interaction, but it does not impact data integrity or availability. The CVSS v3.1 base score is 5.5 (medium), reflecting the moderate risk primarily to confidentiality. The vulnerability was publicly disclosed on January 2, 2026, and fixed in libtpms version 0.10.2. No known exploits are currently in the wild, and no workarounds exist, making patching the only effective mitigation.

Potential Impact

For European organizations, this vulnerability poses a risk to the confidentiality of sensitive data protected by TPM emulation using libtpms. Since TPMs are widely used for secure key storage, device attestation, and cryptographic operations, weakening the cryptographic process can expose encrypted data to potential compromise if an attacker gains local access. This is particularly critical for industries such as finance, healthcare, government, and critical infrastructure, where TPMs underpin security assurances. Although the vulnerability does not affect integrity or availability, the confidentiality breach could lead to unauthorized data disclosure, undermining trust and compliance with data protection regulations like GDPR. The requirement for local privileges limits remote exploitation but does not eliminate insider threats or attacks leveraging compromised local accounts. The absence of known exploits reduces immediate risk but does not preclude future targeted attacks.

Mitigation Recommendations

European organizations should promptly upgrade libtpms to version 0.10.2 or later to remediate the vulnerability. Since no workarounds exist, patching is the primary defense. Additionally, organizations should audit systems using libtpms to identify affected versions and restrict local access to trusted users only. Implementing strict access controls and monitoring for unusual local activity can reduce exploitation risk. Security teams should verify the integration of libtpms with OpenSSL 3.x to ensure no legacy or vulnerable versions remain in use. Regular cryptographic audits and validation of TPM emulation implementations can help detect similar weaknesses. Finally, organizations should maintain up-to-date inventories of cryptographic libraries and dependencies to facilitate rapid response to vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-29T03:00:29.276Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69581901db813ff03efbfeb4

Added to database: 1/2/2026, 7:14:09 PM

Last enriched: 1/9/2026, 9:21:02 PM

Last updated: 2/7/2026, 7:40:55 AM

Views: 162

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats