Security News > 2021 > October > Microsoft fixes Surface Pro 3 TPM bypass with public exploit code
Microsoft has patched a security feature bypass vulnerability impacting Surface Pro 3 tablets, enabling threat actors to introduce malicious devices within enterprise environments.
Device Health Attestation is a cloud and on-premises service that validates TPM and PCR logs for endpoints and informs Mobile Device Management solutions if Secure Boot, BitLocker, and Early Launch Antimalware are enabled, Trusted Boot is correctly signed, and more.
"Devices use Platform Configuration Registers to record information about device and software configuration to ensure that the boot process is secure. Windows uses these PCR measurements to determine device health," Microsoft explains.
Microsoft confirmed Fenner's findings that the Surface Pro 3 is exposed to attacks if not patched.
More recent Surface devices such as the Surface Pro 4, Surface Book are not vulnerable.
While the Surface Pro 3 was released in June 2014 and discontinued in November 2016, Redmond says devices from other vendors could also be vulnerable to TPM Carte Blanche attacks and that it attempted to notify all affected vendors of the issue.
News URL
Related news
- VEILDrive Attack Exploits Microsoft Services to Evade Detection and Distribute Malware (source)
- PoC exploit chains Mitel MiCollab 0-day, auth-bypass bug to access sensitive files (source)
- Researchers Uncover Symlink Exploit Allowing TCC Bypass in iOS and macOS (source)
- Attackers Exploit Microsoft Teams and AnyDesk to Deploy DarkGate Malware (source)