March 4, 2023, 3:11 p.m. | Bill Toulas

BleepingComputer www.bleepingcomputer.com

The Trusted Platform Module (TPM) 2.0 specification is affected by two buffer overflow vulnerabilities that could allow attackers to access or overwrite sensitive data, such as cryptographic keys. [...]

access attackers buffer buffer overflow data flaws hackers keys overflow platform security sensitive data steal tpm tpm 2.0 trusted platform module vulnerabilities

Senior Security Engineer

@ LiquidX | Singapore, Central Singapore, Singapore

Application Security Engineer

@ Solidigm | Zapopan, Mexico

Application Security Engineer

@ Yassir | worldwide

Senior Windows Threat & Detection Security Researcher (Cortex)

@ Palo Alto Networks | Tel Aviv-Yafo, Israel

MDR Security Analyst

@ SentinelOne | Israel

Principal Security Research Engineer (Prisma Cloud)

@ Palo Alto Networks | Bengaluru, India