Home

Description

libtpms, a library that provides software emulation of a Trusted Platform Module, has a flaw in versions 0.10.0 and 0.10.1. The commonly used integration of libtpms with OpenSSL 3.x contained a vulnerability related to the returned IV (initialization vector) when certain symmetric ciphers were used. Instead of returning the last IV it returned the initial IV to the caller, thus weakening the subsequent encryption and decryption steps. The highest threat from this vulnerability is to data confidentiality. Version 0.10.2 fixes the issue. No known workarounds are available.

PUBLISHED Reserved 2025-12-29 | Published 2026-01-02 | Updated 2026-01-05 | Assigner GitHub_M




MEDIUM: 5.5CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-327: Use of a Broken or Risky Cryptographic Algorithm

CWE-330: Use of Insufficiently Random Values

Product status

>= 0.10.0, < 0.10.2
affected

References

github.com/...ibtpms/security/advisories/GHSA-7jxr-4j3g-p34f

github.com/stefanberger/libtpms/issues/541

github.com/...ommit/33c9ff074cb16c1841ce7d7f33643c17c426743a

cve.org (CVE-2026-21444)

nvd.nist.gov (CVE-2026-21444)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.