Why Old TPM Attacks Are Still Relevant and Why You Should Care
Recently, a video surfaced on LinkedIn demonstrating a physical attack on the pins of a TPM v1.0 module. The attack showed how an attacker with physical access could manipulate the communication between the TPM chip and the motherboard to extract sensitive data. One respected peer suggested that newer systems no longer rely on discrete TPM chips but instead use firmware-based TPM (fTPM) solutions integrated into the CPU. This is an important evolution in system security architecture, as fTPM eliminates the need for a separate physical chip and the associated vulnerabilities of physical tampering or pin-based attacks that could compromise discrete TPMs.
While it’s true that modern hardware, particularly Windows 11-compliant systems, relies on TPM 2.0 and often fTPM, this doesn't mean old attacks are irrelevant. Many businesses worldwide still use older laptops and systems that depend on earlier versions of TPM, such as TPM 1.0 and 1.2, which remain vulnerable to the same hardware-based attacks. Moreover, even modern implementations such as Intel PTT, TPM 2.0, and fTPM are not immune to emerging threats like voltage fault injection attacks, side-channel exploits, and vulnerabilities targeting multi-tenant cloud environments. This is where Common Criteria Protection Profiles and CVE references play a crucial role, as they define the security requirements necessary to protect these technologies from advanced attack vectors.
In my experience, I’ve seen older machines with legacy TPMs being actively used in accredited scientific labs. In many of these environments, the results from scientific instruments are internationally accepted only if the systems remain in a specific configuration state, which often includes legacy hardware like older TPM versions. This reliance on outdated hardware leaves these systems vulnerable to old attack vectors, like pin-based physical attacks on TPM 1.0 and 1.2.
This is why the Information Security Manual (ISM) control 1809 stresses the need for compensating controls when systems rely on legacy hardware no longer supported by vendors but cannot be immediately replaced.
Additionally, as an IRAP Assessor, I have conducted Cloud IRAP Assessments for major platforms such as Google GCP and AWS, where ISM controls call for robust system integrity measurements relating to key creation and usage. This is highly relevant to the security of multi-tenant cloud environments, where side-channel attacks or cross-tenant vulnerabilities can compromise sensitive cryptographic operations. Both older and newer implementations of TPM, fTPM, Intel PTT, and TEEs are critical in ensuring the security of these environments, particularly as key creation and integrity are foundational to secure operations across tenants.
This is why Google and AWS ensure they align with ISM-1745.?This calls for enabling Secure Boot and Measured Boot to validate the firmware running fTPM during startup, ensuring that unauthorised modifications cannot compromise the system. I have validated this for both vendors.
Recent Alert: Compromise of Routers and IoT Devices by State-Sponsored Actors
As highlighted by a recent ASD cybersecurity alert, the People’s Republic of China-linked actors have recently been linked to compromising routers and IoT devices for botnet operations. These devices often lack proper firmware updates or advanced security features, making them easy targets for malicious actors. IoT devices, especially those in critical infrastructure, rely heavily on TPM, fTPM, Intel PTT, and TEEs for secure boot, key management, and communication. This alert emphasises the importance of maintaining secure configurations and applying patches to IoT devices that rely on these security modules to prevent large-scale compromises, such as botnet participation or system manipulation.
Old Systems, Old Vulnerabilities: The Reality of Corporate IT
One of the most significant oversights in security planning is assuming that because new technology exists, old threats are obsolete. However, many sectors—manufacturing, finance, and government—often have extended hardware refresh cycles due to budget constraints or regulatory requirements.
For instance, when I was recently in Japan and was travelling on the Shinkansen bullet train, I noticed that some passengers were using older corporate laptops that still relied on TPM 1.2 chips. These systems are vulnerable to pin-based attacks, where attackers physically tap into the communication lines between the TPM chip and the CPU, extracting cryptographic keys or bypassing secure boot processes. Your attack surface is wide open if any part of your IT infrastructure still relies on legacy systems.
This is why ISM-1903 requires patches, updates, or other vendor mitigations for firmware vulnerabilities to be applied within 48 hours of being assessed as critical.
Why are TPM 1.0 and 1.2 Still Vulnerable?
Real-World Examples of TPM, fTPM, Intel PTT, and TEE Breaches
TPM-FAIL Vulnerability
In 2019, the TPM-FAIL vulnerability was discovered, affecting Intel’s fTPM and STMicroelectronics’ TPM chips. Researchers demonstrated a side-channel attack on the cryptographic signature generation process, allowing them to recover cryptographic keys. This attack had major implications for IoT devices and systems in critical infrastructure such as smart cities, connected vehicles, and healthcare systems. TPM-based authentication and secure communications are essential for operational security.
This is why ISM-0280 advises selecting Common Criteria-certified products evaluated for resilience against such vulnerabilities.
faulTPM (Voltage Fault Injection Attack)
The faulTPM attack was a breakthrough in 2021, targeting AMD’s fTPM. Researchers could extract sensitive cryptographic keys stored within the fTPM using voltage fault injection. This breach allowed the compromise of BitLocker encryption and other security mechanisms relying on TPM. The attack demonstrated how voltage manipulation could expose keys that should have been securely stored, potentially impacting critical systems using industrial IoT devices or connected healthcare equipment reliant on AMD’s architecture.
This is why ISM-0380 requires disabling unnecessary system features, such as voltage control, which could prevent voltage fault injection attacks that target firmware vulnerabilities.
Intel CSME Flaw
In 2020, a significant flaw was discovered in Intel’s Converged Security and Manageability Engine (CSME), which underpins Intel PTT. This flaw could compromise cryptographic keys and allow unauthorised access to sensitive data in industrial control systems, smart grid management tools, and connected medical devices that use Intel-based security. Although challenging to exploit, this vulnerability raised serious concerns about the safety of critical infrastructure systems reliant on Intel technology.
TPM 2.0: Improved Security, But Not Invulnerable
While TPM 2.0, required for Windows 11, provides more robust security mechanisms, vulnerabilities still exist. High-profile weaknesses such as faulTPM and Plundervolt demonstrate that even modern systems require regular updates and security evaluations to mitigate emerging risks.
fTPM (Firmware-Based TPM) and TPM 2.0: What's the Difference?
fTPM’s Firmware-Based Architecture:
fTPM provides the same functions as discrete TPM 2.0 but is integrated into the CPU’s firmware. While this removes physical tampering risks, it opens new avenues for firmware-based attacks.
Security Trade-offs in TEEs:
Trusted Execution Environments (TEEs) like Intel SGX or ARM TrustZone are designed to handle sensitive data securely. However, attacks like Plundervolt and Spectre/Meltdown have exposed weaknesses in these environments.
Voltage Fault Injection: faulTPM and Plundervolt Attacks
faulTPM: AMD’s fTPM Vulnerability
The faulTPM vulnerability exploited voltage fault injection to disrupt cryptographic operations in AMD’s fTPM, allowing attackers to extract encryption keys stored in the TPM. Researchers bypassed security mechanisms such as BitLocker by manipulating the CPU's voltage.
领英推荐
Plundervolt: Undermining Intel SGX
The Plundervolt attack targeted Intel SGX, a prominent TEE implementation. By reducing CPU voltage, attackers could induce faults in secure enclave operations, potentially allowing them to access sensitive data.
Defending Against Voltage Fault Injection Attacks
Voltage fault injection attacks, such as those seen in faulTPM and Plundervolt, exploit weaknesses in how systems handle power and voltage management. These attacks can compromise sensitive data, particularly cryptographic keys. Multiple defensive strategies must be implemented at the hardware and firmware levels to protect systems from these attacks.
1. Firmware and Microcode Updates
2. Lockdown of Power Management Features
3. Error Detection and Correction (EDAC)
4. Physical Security and Tamper Detection
5. Constant-Time Cryptographic Implementations
6. Certified Hardware
7. Monitoring and Auditing
What Should Businesses Do?
1. Vulnerability Scan Your Hardware
2. Apply Firmware Updates
3. Select Evaluated Products
4. Harden Systems
Conclusion: Old Attacks Are Still Relevant, and New Ones Are Evolving
Real-world vulnerabilities like TPM-FAIL, faulTPM, and Intel CSME flaws demonstrate that even the latest security technologies in critical infrastructure and IoT devices remain vulnerable to emerging attack vectors. These breaches can have devastating consequences, from data theft in connected vehicles to operational failures in industrial control systems and smart grid infrastructure.
Organisations must take proactive steps to ensure their TPM, fTPM, Intel PTT, and TEE implementations are updated, hardened, and evaluated against Common Criteria Protection Profiles. By doing so, they can mitigate both old and new risks in critical systems, safeguarding sensitive operations from the next generation of attacks.
In light of recent attacks, such as botnet operations targeting IoT devices, organisations must understand that adversaries continuously adapt and exploit outdated and emerging vulnerabilities. Adhering to ISM controls and leveraging Common Criteria-certified products are essential to ensure system resilience in an ever-evolving threat landscape.
The Essential Eight ISM controls that are relevant to mitigating attacks like Plundervolt and faulTPM include:
These controls ensure timely identification and remediation of vulnerabilities that such attacks could exploit.
Author Bio
Nathan Joy is a seasoned cybersecurity professional with over two decades of experience safeguarding Australian Government agencies and cloud vendors. As the first IT security manager in the Australian Government to implement the ASD Top 4 controls, Nathan played a pivotal role in pioneering robust cybersecurity practices within our nation. His dedication to innovation was recognised by the prestigious SANS Cyber Security Innovation Award, and he even had the honour of briefing the Whitehouse, Homeland Security, and the NSA on Australia's groundbreaking approach. Nathan's expertise extends to all cloud deployment models (IaaS, PaaS, SaaS) and is further validated by his IRAP assessor endorsement from the Australian Signals Directorate (ASD) since 2011. The views and opinions expressed in this article are Nathan's own and do not reflect the official position of the ASD or the Australian Cyber Security Centre (ACSC).