CVE-2026-21444: CWE-327: Use of a Broken or Risky Cryptographic Algorithm in stefanberger libtpms
libtpms, a library that provides software emulation of a Trusted Platform Module, has a flaw in versions 0.10.0 and 0.10.1. The commonly used integration of libtpms with OpenSSL 3.x contained a vulnerability related to the returned IV (initialization vector) when certain symmetric ciphers were used. Instead of returning the last IV it returned the initial IV to the caller, thus weakening the subsequent encryption and decryption steps. The highest threat from this vulnerability is to data confidentiality. Version 0.10.2 fixes the issue. No known workarounds are available.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2026-21444 affects libtpms, a software library that emulates Trusted Platform Module (TPM) functionality. Specifically, versions 0.10.0 and 0.10.1 of libtpms, when integrated with OpenSSL 3.x, exhibit a cryptographic flaw related to the handling of the initialization vector (IV) during symmetric encryption operations. Instead of returning the last IV used in the encryption process, libtpms erroneously returns the initial IV to the caller. This incorrect IV handling weakens the cryptographic strength of subsequent encryption and decryption steps, thereby compromising the confidentiality of the data processed by the library. The vulnerability is categorized under CWE-327 (Use of a Broken or Risky Cryptographic Algorithm) and CWE-330 (Use of Insufficiently Random Values). The flaw does not affect data integrity or availability, and exploitation requires local privileges with no user interaction needed. The vulnerability has a CVSS v3.1 base score of 5.5, indicating medium severity. The issue was resolved in libtpms version 0.10.2. No known workarounds are available, emphasizing the need for patching. No exploits have been reported in the wild to date.
Potential Impact
For European organizations, the primary impact of CVE-2026-21444 is the potential compromise of data confidentiality within environments that utilize libtpms for TPM emulation, especially where OpenSSL 3.x is employed. This could affect virtualized systems, secure boot processes, or cryptographic operations relying on TPM functionality. Confidential data protected by these cryptographic operations may be exposed or weakened, increasing the risk of data breaches or unauthorized data disclosure. Although the vulnerability requires local privileges, insider threats or attackers who have gained limited access could exploit it to weaken encryption protections. The absence of impact on integrity and availability reduces the risk of system disruption or data tampering. However, given the critical role of TPMs in hardware-based security, the vulnerability could undermine trust in security mechanisms, affecting compliance with European data protection regulations such as GDPR. Organizations in sectors with high security requirements, including finance, government, and critical infrastructure, may face increased risk if the vulnerability remains unpatched.
Mitigation Recommendations
European organizations should immediately upgrade libtpms to version 0.10.2 or later to remediate the vulnerability. Since no workarounds exist, patching is the only effective mitigation. Additionally, organizations should audit their environments to identify all instances of libtpms usage, particularly in virtualized or TPM-emulated systems integrated with OpenSSL 3.x. Implement strict access controls and monitoring to limit local privilege escalation opportunities, as exploitation requires local access. Review cryptographic configurations to ensure no legacy or weak cipher suites are in use that could compound the risk. Conduct thorough testing post-patching to verify that TPM-related cryptographic operations function correctly. Finally, maintain up-to-date asset inventories and vulnerability management processes to promptly address similar cryptographic issues in the future.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Estonia
CVE-2026-21444: CWE-327: Use of a Broken or Risky Cryptographic Algorithm in stefanberger libtpms
Description
libtpms, a library that provides software emulation of a Trusted Platform Module, has a flaw in versions 0.10.0 and 0.10.1. The commonly used integration of libtpms with OpenSSL 3.x contained a vulnerability related to the returned IV (initialization vector) when certain symmetric ciphers were used. Instead of returning the last IV it returned the initial IV to the caller, thus weakening the subsequent encryption and decryption steps. The highest threat from this vulnerability is to data confidentiality. Version 0.10.2 fixes the issue. No known workarounds are available.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2026-21444 affects libtpms, a software library that emulates Trusted Platform Module (TPM) functionality. Specifically, versions 0.10.0 and 0.10.1 of libtpms, when integrated with OpenSSL 3.x, exhibit a cryptographic flaw related to the handling of the initialization vector (IV) during symmetric encryption operations. Instead of returning the last IV used in the encryption process, libtpms erroneously returns the initial IV to the caller. This incorrect IV handling weakens the cryptographic strength of subsequent encryption and decryption steps, thereby compromising the confidentiality of the data processed by the library. The vulnerability is categorized under CWE-327 (Use of a Broken or Risky Cryptographic Algorithm) and CWE-330 (Use of Insufficiently Random Values). The flaw does not affect data integrity or availability, and exploitation requires local privileges with no user interaction needed. The vulnerability has a CVSS v3.1 base score of 5.5, indicating medium severity. The issue was resolved in libtpms version 0.10.2. No known workarounds are available, emphasizing the need for patching. No exploits have been reported in the wild to date.
Potential Impact
For European organizations, the primary impact of CVE-2026-21444 is the potential compromise of data confidentiality within environments that utilize libtpms for TPM emulation, especially where OpenSSL 3.x is employed. This could affect virtualized systems, secure boot processes, or cryptographic operations relying on TPM functionality. Confidential data protected by these cryptographic operations may be exposed or weakened, increasing the risk of data breaches or unauthorized data disclosure. Although the vulnerability requires local privileges, insider threats or attackers who have gained limited access could exploit it to weaken encryption protections. The absence of impact on integrity and availability reduces the risk of system disruption or data tampering. However, given the critical role of TPMs in hardware-based security, the vulnerability could undermine trust in security mechanisms, affecting compliance with European data protection regulations such as GDPR. Organizations in sectors with high security requirements, including finance, government, and critical infrastructure, may face increased risk if the vulnerability remains unpatched.
Mitigation Recommendations
European organizations should immediately upgrade libtpms to version 0.10.2 or later to remediate the vulnerability. Since no workarounds exist, patching is the only effective mitigation. Additionally, organizations should audit their environments to identify all instances of libtpms usage, particularly in virtualized or TPM-emulated systems integrated with OpenSSL 3.x. Implement strict access controls and monitoring to limit local privilege escalation opportunities, as exploitation requires local access. Review cryptographic configurations to ensure no legacy or weak cipher suites are in use that could compound the risk. Conduct thorough testing post-patching to verify that TPM-related cryptographic operations function correctly. Finally, maintain up-to-date asset inventories and vulnerability management processes to promptly address similar cryptographic issues in the future.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-29T03:00:29.276Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69581901db813ff03efbfeb4
Added to database: 1/2/2026, 7:14:09 PM
Last enriched: 1/2/2026, 7:29:02 PM
Last updated: 1/8/2026, 6:01:19 AM
Views: 82
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0698: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2026-0697: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2026-22581
LowCVE-2026-22580
LowCVE-2026-22579
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.