Microsoft Issues Advisory For Surface Pro 3 TPM Bypass Flaw

October 20, 2021

Microsoft published an advisory that addresses a security feature bypass vulnerability known as CVE-2021-42299 impacting Surface Pro 3.

According to Google security experts who found it, the vulnerability can be exploited in highly complex attacks known as TPM Carte Blanche and could ultimately allow threat actors to introduce malicious devices into enterprise environments.

Exploiting the vulnerability could allow attackers to poison the TPM and PCR protocols to obtain false certificates, allowing them to compromise the Device Health Attestation. The Device Health Attestation is a cloud and on-premise service that validates TPM and PCR protocols for endpoints and notifies mobile device management solutions when Secure Boot, BitLocker and Early Launch Antimalware are enabled, Trusted Boot is correctly signed, and other validation processes are performed.

While newer Surface devices such as the Surface Pro 4 and Surface Book are not vulnerable, Microsoft said other devices from other manufacturers could be vulnerable to TPM Carte Blanche attacks.

For more information, read the original story in BleepingComputer.

Top Stories

Related Articles

February 5, 2026 A security researcher at Koi named Oren Yomtov has uncovered a widespread malware operation embedded inside an more...

February 4, 2026 More than three million Fortinet devices have been exposed to a critical authentication-bypass vulnerability that is being more...

February 4, 2026 A now-patched security flaw in Docker’s built-in AI assistant exposed users to the risk of remote code more...

January 28, 2026 A suspected credit card skimming attack on the Canada Computers online store may have quietly exposed customer more...

Picture of TND News Desk

TND News Desk

Staff writer for Tech Newsday.
Picture of TND News Desk

TND News Desk

Staff writer for Tech Newsday.

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn