The vulnerability, CVE-2023-43630, lies in the improper configuration of the Trusted Platform Module (TPM) sealing mechanism for the vault key in EVE OS. The root cause is twofold: the use of the outdated SHA1 hashing algorithm and, more critically, the omission of PCR14 from the list of registers used to seal the key. PCR14 is responsible for measuring the integrity of the configuration partition (/config).
The provided patch d9383a7ee4e1c39f5c8c6d4a63cb2ebd00695e8a directly addresses this by modifying the global variable DiskKeySealingPCRs in pkg/pillar/evetpm/tpm.go. The patch switches the hash algorithm to SHA256 and adds PCR14 to the list of PCRs.
An attacker with physical access could exploit this by removing the disk, modifying files in the /config partition, and reinstalling it. During boot, the system would fail to detect these modifications because the integrity of that partition was not being measured as part of the unsealing policy. The functions identified as vulnerable are those that constitute the runtime execution path for sealing and unsealing the disk key, as they directly or indirectly consume this flawed configuration. When the system boots, FetchSealedVaultKey and subsequently UnsealDiskKey would appear in a profiler's stack trace, executing the flawed logic that permits unsealing the key despite the integrity violation.