Security News > 2021 > October > Microsoft fixes Surface Pro 3 TPM bypass with public exploit code
Microsoft has patched a security feature bypass vulnerability impacting Surface Pro 3 tablets, enabling threat actors to introduce malicious devices within enterprise environments.
Device Health Attestation is a cloud and on-premises service that validates TPM and PCR logs for endpoints and informs Mobile Device Management solutions if Secure Boot, BitLocker, and Early Launch Antimalware are enabled, Trusted Boot is correctly signed, and more.
"Devices use Platform Configuration Registers to record information about device and software configuration to ensure that the boot process is secure. Windows uses these PCR measurements to determine device health," Microsoft explains.
Microsoft confirmed Fenner's findings that the Surface Pro 3 is exposed to attacks if not patched.
More recent Surface devices such as the Surface Pro 4, Surface Book are not vulnerable.
While the Surface Pro 3 was released in June 2014 and discontinued in November 2016, Redmond says devices from other vendors could also be vulnerable to TPM Carte Blanche attacks and that it attempted to notify all affected vendors of the issue.
News URL
Related news
- New Mamba 2FA bypass service targets Microsoft 365 accounts (source)
- Exploit code for critical GitLab auth bypass flaw released (CVE-2024-45409) (source)
- Microsoft SharePoint RCE flaw exploits in the wild – you've had 3 months to patch (source)
- VEILDrive Attack Exploits Microsoft Services to Evade Detection and Distribute Malware (source)