TPM-Sniffing LUKS Keys on an Embedded Linux Device [CVE-2026-0714]
Tiberium
19 points
8 comments
March 01, 2026
Related Discussions
Found 5 related stories in 50.1ms across 3,471 title embeddings via pgvector HNSW
- Intel SGX: Global Wrapping Key Extracted fogzen · 11 pts · April 01, 2026 · 54% similar
- CVE-2026-3888: Important Snap Flaw Enables Local Privilege Escalation to Root askl · 118 pts · March 18, 2026 · 53% similar
- Claude Code Found a Linux Vulnerability Hidden for 23 Years eichin · 25 pts · April 03, 2026 · 51% similar
- OpenClaw privilege escalation vulnerability kykeonaut · 303 pts · April 03, 2026 · 50% similar
- An Interesting Find: STM32 RDP1 Decryptor carlossless · 79 pts · March 02, 2026 · 50% similar
Discussion Highlights (2 comments)
Tiberium
Relevant: https://lkml.org/lkml/2025/8/14/1583 , https://lore.kernel.org/linux-integrity/20250825203223.62951... (Disables TCG_TPM2_HMAC by default)
eqvinox
Not exactly surprising; unless you establish some type of shared secret between the TPM and CPU (e.g. by burning it into fuses in both devices, or through some signature scheme), the bus connecting the two will always be a problem…