Browse all 3 CVE security advisories affecting Trusted Computing Group. AI-powered Chinese analysis, POCs, and references for each vulnerability.
The Trusted Computing Group develops open standards for hardware-enabled security features like TPMs and secure boot, primarily used for device authentication and encrypted storage. Historically, their implementations have been vulnerable to classes including remote code execution, cross-site scripting, and privilege escalation, often stemming from improper input validation or cryptographic flaws. While no major public incidents have been widely documented, the organization maintains a moderate CVE count with three currently active records, highlighting ongoing challenges in secure standard implementation across diverse hardware ecosystems.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-2884 | Out-of-Bounds read vulnerability in TCG TPM2.0 reference implementation — TPM2.0 | 9.1AI | CriticalAI | 2025-06-10 |
| CVE-2023-1017 | TPM2.0 vulnerable to out-of-bounds write — TPM2.0 | 6.7 | - | 2023-02-28 |
| CVE-2023-1018 | TPM2.0 vulnerable to out-of-bounds read — TPM2.0 | 4.4 | - | 2023-02-28 |
This page lists every published CVE security advisory associated with Trusted Computing Group. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.