CVE-2023-38023

An issue was discovered in SCONE Confidential Computing Platform before 5.8.0 for Intel SGX. Lack of pointer-alignment logic in __scone_dispatch and other entry functions allows a local attacker to access unauthorized information, aka an "AEPIC Leak."
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:scontain:scone:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:software_guard_extensions:-:*:*:*:*:*:*:*

History

17 Jan 2024, 14:52

Type Values Removed Values Added
References () https://github.com/openenclave/openenclave/security/advisories/GHSA-v3vm-9h66-wm76 - () https://github.com/openenclave/openenclave/security/advisories/GHSA-v3vm-9h66-wm76 - Not Applicable, Third Party Advisory
References () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00657.html - () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00657.html - Not Applicable, Third Party Advisory
References () https://sconedocs.github.io/release5.8/ - () https://sconedocs.github.io/release5.8/ - Release Notes
References () https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html#inpage-nav-3-2-2 - () https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html#inpage-nav-3-2-2 - Not Applicable, Third Party Advisory
References () https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/stale-data-read-from-xapic.html - () https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/stale-data-read-from-xapic.html - Not Applicable, Third Party Advisory
References () https://jovanbulck.github.io/files/oakland24-pandora.pdf - () https://jovanbulck.github.io/files/oakland24-pandora.pdf - Technical Description
References () https://sconedocs.github.io/release5.7/ - () https://sconedocs.github.io/release5.7/ - Release Notes
CPE cpe:2.3:a:scontain:scone:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:software_guard_extensions:-:*:*:*:*:*:*:*
First Time Intel
Scontain scone
Scontain
Intel software Guard Extensions
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

30 Dec 2023, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-30 03:15

Updated : 2024-02-28 20:54


NVD link : CVE-2023-38023

Mitre link : CVE-2023-38023

CVE.ORG link : CVE-2023-38023


JSON object : View

Products Affected

scontain

  • scone

intel

  • software_guard_extensions