Dark
Light

Intel’s SGX security flaw exposed by Russian researcher’s findings

1 min read
45 views


TLDR:

  • Intel’s Software Guard Extensions (SGX) security system may be open to abuse due to a coding flaw
  • Researchers discovered access to Intel SGX Fuse Key0, compromising the system’s security

Article Summary:

Today’s news sheds light on a potential vulnerability in Intel’s SGX security system. Russian researcher Mark Ermolov revealed that a coding error has allowed access to Intel SGX Fuse Key0, jeopardizing the security of the secure enclaves. While this flaw may give attackers full access to supposedly secure data, Intel has emphasized that physical access to the machine and unpatched vulnerabilities are required for exploitation. The issue primarily affects Gemini processor systems, which may still be in use despite being deprecated by Intel.

The discovery poses a significant threat to the security of data stored in SGX-locked enclaves. Researchers warn that trusted enclaves may no longer be reliable, and caution against running any applications on affected platforms. The root cause of this security loophole lies in faulty software that manages SGX’s security mechanisms. Intel has released mitigations for previous vulnerabilities but advises users to remain vigilant.

The introduction of SGX in 2015 aimed to protect sensitive code from unauthorized access, yet issues have persisted over the years. While SGX has been phased out in newer chips, legacy systems and embedded devices still rely on the technology. The debate continues on the actual risk posed by this vulnerability and the extent to which it could be exploited.


Previous Story

Chinese hackers hit US internet providers with secret exploit, experts claim

Next Story

CISA warns of urgent Apache OFBiz flaw with active exploits

Latest from News