CVE-2025-49133
Linux Debian vulnerability analysis and mitigation

Overview

Libtpms, a library targeting TPM functionality integration into hypervisors (primarily Qemu), contains a potential out-of-bounds (OOB) read vulnerability. The vulnerability, identified as CVE-2025-49133, was discovered in the 'CryptHmacSign' function where an inconsistent pairing of the signKey and signScheme parameters occurs when the signKey is ALG_KEYEDHASH key and inScheme is an ECC or RSA scheme (GitHub Advisory).

Technical details

The vulnerability is located in the 'CryptHmacSign' function, which is defined in the TPM 2.0 reference implementation's 'Part 4: Supporting Routines – Code' document, section '7.151 - /tpm/src/crypt/CryptUtil.c'. The issue stems from an inconsistent pairing of cryptographic parameters, specifically when the signKey is ALG_KEYEDHASH key and inScheme is an ECC or RSA scheme. The vulnerability has been assigned a CVSS v3.1 base score of 5.9 (Medium) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H (NVD).

Impact

When exploited, this vulnerability can cause an abort due to the detection of the out-of-bounds access, making a virtual TPM (swtpm) unavailable to a Virtual Machine. This can lead to service disruption for affected systems, particularly impacting virtualized environments that rely on TPM functionality (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been fixed in libtpms versions 0.7.12, 0.8.10, 0.9.7, and 0.10.1. Users are advised to upgrade to these patched versions. There are no known workarounds for this vulnerability (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management