Security News > 2021 > October > Microsoft fixes Surface Pro 3 TPM bypass with public exploit code
![Microsoft fixes Surface Pro 3 TPM bypass with public exploit code](/static/build/img/news/microsoft-fixes-surface-pro-3-tpm-bypass-with-public-exploit-code-medium.jpg)
Microsoft has patched a security feature bypass vulnerability impacting Surface Pro 3 tablets, enabling threat actors to introduce malicious devices within enterprise environments.
Device Health Attestation is a cloud and on-premises service that validates TPM and PCR logs for endpoints and informs Mobile Device Management solutions if Secure Boot, BitLocker, and Early Launch Antimalware are enabled, Trusted Boot is correctly signed, and more.
"Devices use Platform Configuration Registers to record information about device and software configuration to ensure that the boot process is secure. Windows uses these PCR measurements to determine device health," Microsoft explains.
Microsoft confirmed Fenner's findings that the Surface Pro 3 is exposed to attacks if not patched.
More recent Surface devices such as the Surface Pro 4, Surface Book are not vulnerable.
While the Surface Pro 3 was released in June 2014 and discontinued in November 2016, Redmond says devices from other vendors could also be vulnerable to TPM Carte Blanche attacks and that it attempted to notify all affected vendors of the issue.
News URL
Related news
- Exploit for critical Progress Telerik auth bypass released, patch now (source)
- Exploit for critical Veeam auth bypass available, patch now (source)
- Exploit for Veeam Recovery Orchestrator auth bypass available, patch now (source)
- New Attack Technique Exploits Microsoft Management Console Files (source)
- Void Banshee APT Exploits Microsoft MHTML Flaw to Spread Atlantida Stealer (source)