Tag: TPM2
-
Bulletins: Vulnerability Summary for the Week of June 9, 2025
Source URL: https://www.cisa.gov/news-events/bulletins/sb25-167 Source: Bulletins Title: Vulnerability Summary for the Week of June 9, 2025 Feedly Summary: High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info Acer–ControlCenter Acer ControlCenter contains Remote Code Execution vulnerability. The program exposes a Windows Named Pipe that uses a custom protocol to invoke internal functions. However, this Named…
-
Hacker News: Bypassing disk encryption on systems with automatic TPM2 unlock
Source URL: https://oddlama.org/blog/bypassing-disk-encryption-with-tpm2-unlock/ Source: Hacker News Title: Bypassing disk encryption on systems with automatic TPM2 unlock Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text delves into the security implications of using Trusted Platform Module (TPM2) for automatic disk unlocking in Linux systems. It uncovers vulnerabilities present in popular implementations (specifically with clevis…