{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T09:00:13.168","vulnerabilities":[{"cve":{"id":"CVE-2026-21444","sourceIdentifier":"security-advisories@github.com","published":"2026-01-02T19:15:48.763","lastModified":"2026-02-25T15:18:34.413","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"libtpms, a library that provides software emulation of a Trusted Platform Module, has a flaw in versions 0.10.0 and 0.10.1. The commonly used integration of libtpms with OpenSSL 3.x contained a vulnerability related to the returned IV (initialization vector) when certain symmetric ciphers were used. Instead of returning the last IV it returned the initial IV to the caller, thus weakening the subsequent encryption and decryption steps. The highest threat from this vulnerability is to data confidentiality. Version 0.10.2 fixes the issue. No known workarounds are available."},{"lang":"es","value":"libtpms, una biblioteca que proporciona emulación de software de un Módulo de Plataforma Confiable, tiene un fallo en las versiones 0.10.0 y 0.10.1. La integración comúnmente utilizada de libtpms con OpenSSL 3.x contenía una vulnerabilidad relacionada con el IV (vector de inicialización) devuelto cuando se utilizaban ciertos cifrados simétricos. En lugar de devolver el último IV, devolvía el IV inicial al llamador, debilitando así los pasos subsiguientes de cifrado y descifrado. La mayor amenaza de esta vulnerabilidad es para la confidencialidad de los datos. La versión 0.10.2 corrige el problema. No se conocen soluciones alternativas disponibles."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-327"},{"lang":"en","value":"CWE-330"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:libtpms_project:libtpms:*:*:*:*:*:*:*:*","versionStartIncluding":"0.10.0","versionEndExcluding":"0.10.2","matchCriteriaId":"E714F6E7-EE9D-46ED-B5CF-52EDC67277A8"}]}]}],"references":[{"url":"https://github.com/stefanberger/libtpms/commit/33c9ff074cb16c1841ce7d7f33643c17c426743a","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/stefanberger/libtpms/issues/541","source":"security-advisories@github.com","tags":["Exploit","Issue Tracking"]},{"url":"https://github.com/stefanberger/libtpms/security/advisories/GHSA-7jxr-4j3g-p34f","source":"security-advisories@github.com","tags":["Patch","Vendor Advisory"]}]}}]}