The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-2884

CVE-2025-2884: TCG TPM2.0 Buffer Overflow Vulnerability

CVE-2025-2884 is a buffer overflow flaw in TCG TPM2.0 Reference implementation affecting the CryptHmacSign function due to insufficient validation. This article covers technical details, affected versions, and mitigation.

Updated: January 22, 2026

CVE-2025-2884 Overview

CVE-2025-2884 is an out-of-bounds read vulnerability affecting the TCG TPM2.0 Reference Implementation's CryptHmacSign helper function. The vulnerability stems from a lack of validation between the signature scheme and the signature key's algorithm, allowing attackers with local access to potentially read sensitive memory contents or cause a denial of service condition.

Critical Impact

Local attackers can exploit this flaw to access sensitive cryptographic data stored in TPM memory or crash affected systems through out-of-bounds memory access.

Affected Products

  • TCG TPM2.0 Reference Implementation
  • libtpms implementations using vulnerable code
  • Systems implementing TPM 2.0 Library Specification prior to Errata Revision 1.83

Discovery Timeline

  • June 10, 2025 - CVE-2025-2884 published to NVD
  • June 13, 2025 - Last updated in NVD database

Technical Details for CVE-2025-2884

Vulnerability Analysis

This vulnerability exists in the CryptHmacSign helper function within the TPM2.0 reference implementation. The core issue is insufficient validation when processing HMAC signing operations—specifically, the code fails to verify that the signature scheme's hash algorithm is compatible with the signature key's algorithm before proceeding with cryptographic operations.

When an attacker supplies a mismatched or invalid hash algorithm identifier, the function proceeds to access memory locations calculated based on the invalid algorithm value. This results in out-of-bounds memory reads that can expose sensitive cryptographic material or cause the TPM to abort operations unexpectedly.

The vulnerability requires local access and user interaction, meaning an attacker would need either physical access to the system or the ability to execute code locally with sufficient privileges to interact with the TPM subsystem.

Root Cause

The root cause is a missing input validation check in the CryptHmacSign function. The function did not verify that the provided hashAlg parameter represents a valid, implemented hash algorithm before using it to calculate memory offsets and access cryptographic data structures. This is classified as CWE-125 (Out-of-Bounds Read).

The vulnerable code path accepts signature scheme parameters without confirming:

  1. The scheme's hash algorithm is a valid TPM hash algorithm
  2. The hash algorithm is compatible with the signing key type
  3. The digest size matches the expected size for the hash algorithm

Attack Vector

The attack vector is local, requiring an attacker to have local access to the target system. Exploitation involves sending crafted TPM2_Sign commands with intentionally mismatched signature schemes and key algorithms. The attacker can craft requests where:

  1. A signing key is created or loaded with a specific algorithm
  2. A TPM2_Sign command is issued with an incompatible or invalid hash algorithm in the signature scheme
  3. The TPM processes the request without adequate validation, leading to out-of-bounds memory access
c
// Security patch in src/tpm2/SigningCommands.c - tpm2: Fix potential out-of-bound access & abort due to HMAC signing issue
 //      TPM_RC_SCHEME           the scheme is not compatible with sign key type,
 //                              or input scheme is not compatible with default
 //                              scheme, or the chosen scheme is not a valid
-//                              sign scheme
+//                              sign scheme, or the scheme hashAlg is not a
+//                              valid hash algorithm
 //      TPM_RC_TICKET           'validation' is not a valid ticket
 //      TPM_RC_VALUE            the value to sign is larger than allowed for the
 //                              type of 'keyHandle'
+//      TPM_RC_ATTRIBUTES       the key has the x509sign attribute and can't be
+//                              used in TPM2_Sign()
+//      TPM_RC_SIZE             the provided 'digest' does not match the size
+//                              of the scheme hashAlg digest

 TPM_RC
 TPM2_Sign(Sign_In*  in,  // IN: input parameter list

Source: GitHub Commit Change

c
// Security patch in src/tpm2/crypto/CryptHash_fp.h - tpm2: Fix potential out-of-bound access & abort due to HMAC signing issue
 //  Return Type: BOOL
 //      TRUE(1)         hashAlg is a valid, implemented hash on this TPM
 //      FALSE(0)        hashAlg is not valid for this TPM
-BOOL CryptHashIsValidAlg(TPM_ALG_ID hashAlg,  // IN: the algorithm to check
-			 BOOL       flag  // IN: TRUE if TPM_ALG_NULL is to be treated
-			 //     as a valid hash
+BOOL CryptHashIsValidAlg(TPM_ALG_ID hashAlg,        // IN: the algorithm to check
+			 BOOL       isAlgNullValid  // IN: TRUE if TPM_ALG_NULL is to be treated
+					    //     as a valid hash
 			 );

 //*** CryptHashGetAlgByIndex()

Source: GitHub Commit Change

Detection Methods for CVE-2025-2884

Indicators of Compromise

  • Unexpected TPM abort events or error codes (TPM_RC_SCHEME, TPM_RC_SIZE) in system logs
  • Abnormal TPM2_Sign command patterns with mismatched algorithm parameters
  • System crashes or instability related to TPM operations
  • Memory access violations originating from TPM-related processes or drivers

Detection Strategies

  • Monitor system logs for TPM error codes, particularly TPM_RC_SCHEME and TPM_RC_FAILURE responses
  • Implement TPM command auditing to detect unusual signing requests with invalid hash algorithm combinations
  • Deploy endpoint detection rules to identify processes making abnormal TPM API calls
  • Review TPM event logs for repeated failed signing operations that may indicate exploitation attempts

Monitoring Recommendations

  • Enable TPM command auditing on critical systems to log all TPM2_Sign operations
  • Configure security monitoring solutions to alert on TPM-related process crashes or abnormal terminations
  • Implement behavioral analysis to detect unusual patterns of TPM API usage by applications
  • Review firmware and driver logs for TPM subsystem errors that could indicate exploitation

How to Mitigate CVE-2025-2884

Immediate Actions Required

  • Update libtpms installations to versions containing commit 04b2d8e9afc0a9b6bffe562a23e58c0de11532d1
  • Review and apply the TPM 2.0 Library Specification Errata Revision 1.83
  • Consult vendor-specific advisories for firmware updates (see Intel Security Advisory SA-01209)
  • Audit systems to identify TPM implementations that may be affected

Patch Information

The vulnerability has been addressed in the TCG TPM 2.0 Library Specification Errata Revision 1.83. The fix adds proper validation to ensure the signature scheme's hash algorithm is valid and compatible before processing signing operations. The patch introduces additional return codes (TPM_RC_ATTRIBUTES, TPM_RC_SIZE) and validates that the digest size matches the scheme's hash algorithm digest size.

For technical details on the fix, refer to the libtpms security patch and the Trusted Computing Group Security Advisory.

Additional resources:

  • TPM 2.0 Library Specification Errata
  • CERT Vulnerability Report #282450

Workarounds

  • Restrict local access to TPM interfaces to authorized users and applications only
  • Implement application-level input validation before passing parameters to TPM functions
  • Use application allowlisting to control which processes can interact with TPM subsystems
  • Monitor and audit TPM operations on critical systems until patches can be applied
bash
# Configuration example
# Restrict TPM device access to specific groups (Linux example)
sudo chmod 660 /dev/tpm0
sudo chgrp tss /dev/tpm0

# Verify TPM access permissions
ls -la /dev/tpm*

# Check for libtpms package version (Debian/Ubuntu)
dpkg -l | grep libtpms

# Update libtpms to patched version
sudo apt-get update && sudo apt-get upgrade libtpms0

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeBuffer Overflow

  • Vendor/TechTpm

  • SeverityMEDIUM

  • CVSS Score6.6

  • EPSS Probability0.02%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-125
  • Technical References
  • GitHub Commit Change

  • Trusted Computing Group Security Info

  • TPM 2.0 Library Specification Errata

  • Trusted Computing Group Security Advisory

  • CVE-2025-49133 Record

  • Intel Security Advisory SA-01209

  • CERT Vulnerability Report #282450
  • Latest CVEs
  • CVE-2026-35467: Browser API Key Information Disclosure

  • CVE-2026-35466: cveInterface.js XSS Vulnerability

  • CVE-2026-30252: ZenShare Suite XSS Vulnerability

  • CVE-2026-30251: ZenShare Suite v17.0 XSS Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English