CVE-2023-37479

CVSS 3.1 Score 7.5 of 10 (high)

Details

Published Jul 17, 2023
Updated: Jul 28, 2023
CWE ID 665

Summary

CVE-2023-37479 is a vulnerability in the Open Enclave SDK, a hardware-agnostic open source library for developing applications that use Trusted Execution Environments (Enclaves). The vulnerability affects various products, including enbPnI, enbPnD, and enbPnC. The first issue is that the SDK does not properly sanitize the `MXCSR` register on enclave entry, making applications vulnerable to MXCSR Configuration Dependent Timing (MCDT) attacks. The second issue is that the SDK does not sanitize x86's alignment check flag `RFLAGS.AC` on enclave entry, which allows for side-channel attacks. To remediate this vulnerability, users will need to recompile their applications against the patched libraries provided in version 0.19.3 of Open Enclave SDK. The potential danger posed by this vulnerability is high, with a base severity rating of HIGH and an integrity impact of HIGH according to NIST's CVSS score.

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2023-37479 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions