We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-7844

wolfTPM library wrapper function `wolfTPM2_RsaKey_TpmToWolf` copies external data to a fixed-size stack buffer without length validation potentially causing stack-based buffer overflow



Description

Exporting a TPM based RSA key larger than 2048 bits from the TPM could overrun a stack buffer if the default `MAX_RSA_KEY_BITS=2048` is used. If your TPM 2.0 module supports RSA key sizes larger than 2048 bit and your applications supports creating or importing an RSA private or public key larger than 2048 bits and your application calls `wolfTPM2_RsaKey_TpmToWolf` on that key, then a stack buffer could be overrun. If the `MAX_RSA_KEY_BITS` build-time macro is set correctly (RSA bits match what TPM hardware is capable of) for the hardware target, then a stack overrun is not possible.

Reserved 2025-07-18 | Published 2025-08-04 | Updated 2025-08-04 | Assigner wolfSSL


LOW: 1.0CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/U:Green

Problem types

CWE-121

Product status

Default status
unaffected

Any version
affected

Credits

Richard Mitev, Giannis Mouzenidis, Patrick Jauernig from SANCTUARY Systems GmbH finder

References

github.com/wolfSSL/wolfTPM/pull/427

cve.org (CVE-2025-7844)

nvd.nist.gov (CVE-2025-7844)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-7844

Support options

Helpdesk Chat, Email, Knowledgebase