Microsoft Issues Advisory For Surface Pro 3 TPM Bypass Flaw

October 20, 2021

Microsoft published an advisory that addresses a security feature bypass vulnerability known as CVE-2021-42299 impacting Surface Pro 3.

According to Google security experts who found it, the vulnerability can be exploited in highly complex attacks known as TPM Carte Blanche and could ultimately allow threat actors to introduce malicious devices into enterprise environments.

Exploiting the vulnerability could allow attackers to poison the TPM and PCR protocols to obtain false certificates, allowing them to compromise the Device Health Attestation. The Device Health Attestation is a cloud and on-premise service that validates TPM and PCR protocols for endpoints and notifies mobile device management solutions when Secure Boot, BitLocker and Early Launch Antimalware are enabled, Trusted Boot is correctly signed, and other validation processes are performed.

While newer Surface devices such as the Surface Pro 4 and Surface Book are not vulnerable, Microsoft said other devices from other manufacturers could be vulnerable to TPM Carte Blanche attacks.

For more information, read the original story in BleepingComputer.

Top Stories

Related Articles

April 1, 2026 Anthropic has inadvertently exposed the full source code of its Claude Code tool for the second time more...

April 1, 2026 Cisco suffered a cyberattack after attackers used stolen credentials from a compromised developer tool to access its more...

March 30, 2026 Google has expanded its “Results about you” tool, allowing users to remove highly sensitive personal data, including more...

March 27, 2026 Microsoft is updating GitHub Copilot to train on real-world developer interactions, expanding beyond public code datasets to more...

Picture of TND News Desk

TND News Desk

Staff writer for Tech Newsday.
Picture of TND News Desk

TND News Desk

Staff writer for Tech Newsday.

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn