CVE-2026-21444: CWE-327: Use of a Broken or Risky Cryptographic Algorithm in stefanberger libtpms
libtpms, a library that provides software emulation of a Trusted Platform Module, has a flaw in versions 0.10.0 and 0.10.1. The commonly used integration of libtpms with OpenSSL 3.x contained a vulnerability related to the returned IV (initialization vector) when certain symmetric ciphers were used. Instead of returning the last IV it returned the initial IV to the caller, thus weakening the subsequent encryption and decryption steps. The highest threat from this vulnerability is to data confidentiality. Version 0.10.2 fixes the issue. No known workarounds are available.
AI Analysis
Technical Summary
CVE-2026-21444 affects libtpms, a software library that emulates Trusted Platform Module (TPM) functionality, specifically in versions 0.10.0 and 0.10.1. The vulnerability arises from improper handling of the initialization vector (IV) in cryptographic operations when libtpms is integrated with OpenSSL 3.x. Instead of returning the last IV used in symmetric cipher operations, libtpms erroneously returns the initial IV to the caller. This behavior undermines the cryptographic strength of the encryption and decryption processes, leading to weakened data confidentiality. The flaw is categorized under CWE-327 (Use of a Broken or Risky Cryptographic Algorithm) and CWE-330 (Use of Insufficiently Random Values). Exploitation requires local access with low privileges and does not require user interaction, but it does not impact data integrity or availability. The CVSS v3.1 base score is 5.5 (medium), reflecting the moderate risk primarily to confidentiality. The vulnerability was publicly disclosed on January 2, 2026, and fixed in libtpms version 0.10.2. No known exploits are currently in the wild, and no workarounds exist, making patching the only effective mitigation.
Potential Impact
For European organizations, this vulnerability poses a risk to the confidentiality of sensitive data protected by TPM emulation using libtpms. Since TPMs are widely used for secure key storage, device attestation, and cryptographic operations, weakening the cryptographic process can expose encrypted data to potential compromise if an attacker gains local access. This is particularly critical for industries such as finance, healthcare, government, and critical infrastructure, where TPMs underpin security assurances. Although the vulnerability does not affect integrity or availability, the confidentiality breach could lead to unauthorized data disclosure, undermining trust and compliance with data protection regulations like GDPR. The requirement for local privileges limits remote exploitation but does not eliminate insider threats or attacks leveraging compromised local accounts. The absence of known exploits reduces immediate risk but does not preclude future targeted attacks.
Mitigation Recommendations
European organizations should promptly upgrade libtpms to version 0.10.2 or later to remediate the vulnerability. Since no workarounds exist, patching is the primary defense. Additionally, organizations should audit systems using libtpms to identify affected versions and restrict local access to trusted users only. Implementing strict access controls and monitoring for unusual local activity can reduce exploitation risk. Security teams should verify the integration of libtpms with OpenSSL 3.x to ensure no legacy or vulnerable versions remain in use. Regular cryptographic audits and validation of TPM emulation implementations can help detect similar weaknesses. Finally, organizations should maintain up-to-date inventories of cryptographic libraries and dependencies to facilitate rapid response to vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Estonia
CVE-2026-21444: CWE-327: Use of a Broken or Risky Cryptographic Algorithm in stefanberger libtpms
Description
libtpms, a library that provides software emulation of a Trusted Platform Module, has a flaw in versions 0.10.0 and 0.10.1. The commonly used integration of libtpms with OpenSSL 3.x contained a vulnerability related to the returned IV (initialization vector) when certain symmetric ciphers were used. Instead of returning the last IV it returned the initial IV to the caller, thus weakening the subsequent encryption and decryption steps. The highest threat from this vulnerability is to data confidentiality. Version 0.10.2 fixes the issue. No known workarounds are available.
AI-Powered Analysis
Technical Analysis
CVE-2026-21444 affects libtpms, a software library that emulates Trusted Platform Module (TPM) functionality, specifically in versions 0.10.0 and 0.10.1. The vulnerability arises from improper handling of the initialization vector (IV) in cryptographic operations when libtpms is integrated with OpenSSL 3.x. Instead of returning the last IV used in symmetric cipher operations, libtpms erroneously returns the initial IV to the caller. This behavior undermines the cryptographic strength of the encryption and decryption processes, leading to weakened data confidentiality. The flaw is categorized under CWE-327 (Use of a Broken or Risky Cryptographic Algorithm) and CWE-330 (Use of Insufficiently Random Values). Exploitation requires local access with low privileges and does not require user interaction, but it does not impact data integrity or availability. The CVSS v3.1 base score is 5.5 (medium), reflecting the moderate risk primarily to confidentiality. The vulnerability was publicly disclosed on January 2, 2026, and fixed in libtpms version 0.10.2. No known exploits are currently in the wild, and no workarounds exist, making patching the only effective mitigation.
Potential Impact
For European organizations, this vulnerability poses a risk to the confidentiality of sensitive data protected by TPM emulation using libtpms. Since TPMs are widely used for secure key storage, device attestation, and cryptographic operations, weakening the cryptographic process can expose encrypted data to potential compromise if an attacker gains local access. This is particularly critical for industries such as finance, healthcare, government, and critical infrastructure, where TPMs underpin security assurances. Although the vulnerability does not affect integrity or availability, the confidentiality breach could lead to unauthorized data disclosure, undermining trust and compliance with data protection regulations like GDPR. The requirement for local privileges limits remote exploitation but does not eliminate insider threats or attacks leveraging compromised local accounts. The absence of known exploits reduces immediate risk but does not preclude future targeted attacks.
Mitigation Recommendations
European organizations should promptly upgrade libtpms to version 0.10.2 or later to remediate the vulnerability. Since no workarounds exist, patching is the primary defense. Additionally, organizations should audit systems using libtpms to identify affected versions and restrict local access to trusted users only. Implementing strict access controls and monitoring for unusual local activity can reduce exploitation risk. Security teams should verify the integration of libtpms with OpenSSL 3.x to ensure no legacy or vulnerable versions remain in use. Regular cryptographic audits and validation of TPM emulation implementations can help detect similar weaknesses. Finally, organizations should maintain up-to-date inventories of cryptographic libraries and dependencies to facilitate rapid response to vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-29T03:00:29.276Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69581901db813ff03efbfeb4
Added to database: 1/2/2026, 7:14:09 PM
Last enriched: 1/9/2026, 9:21:02 PM
Last updated: 2/7/2026, 7:40:55 AM
Views: 162
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2076: Improper Authorization in yeqifu warehouse
MediumCVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.