CVSS 3.1 Score 7.5 of 10 (high)


Published Jul 17, 2023
Updated: Jul 28, 2023
CWE ID 665


CVE-2023-37479 is a vulnerability in the Open Enclave SDK, a hardware-agnostic open source library for developing applications that use Trusted Execution Environments (Enclaves). The vulnerability affects various products, including enbPnI, enbPnD, and enbPnC. The first issue is that the SDK does not properly sanitize the `MXCSR` register on enclave entry, making applications vulnerable to MXCSR Configuration Dependent Timing (MCDT) attacks. The second issue is that the SDK does not sanitize x86's alignment check flag `RFLAGS.AC` on enclave entry, which allows for side-channel attacks. To remediate this vulnerability, users will need to recompile their applications against the patched libraries provided in version 0.19.3 of Open Enclave SDK. The potential danger posed by this vulnerability is high, with a base severity rating of HIGH and an integrity impact of HIGH according to NIST's CVSS score.

Leverage our Vulnerability Intelligence module to secure your systems now - get detailed insights on CVE-2024-37364. Book your demo today.


Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-37479 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options