An issue was discovered in SCONE Confidential Computing Platform before 5.8.0 for Intel SGX. Lack of pointer-alignment logic in __scone_dispatch and other entry functions allows a local attacker to access unauthorized information, aka an "AEPIC Leak."
References
Link | Resource |
---|---|
https://github.com/openenclave/openenclave/security/advisories/GHSA-v3vm-9h66-wm76 | Not Applicable Third Party Advisory |
https://jovanbulck.github.io/files/oakland24-pandora.pdf | Technical Description |
https://sconedocs.github.io/release5.7/ | Release Notes |
https://sconedocs.github.io/release5.8/ | Release Notes |
https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/stale-data-read-from-xapic.html | Not Applicable Third Party Advisory |
https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html#inpage-nav-3-2-2 | Not Applicable Third Party Advisory |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00657.html | Not Applicable Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
17 Jan 2024, 14:52
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/openenclave/openenclave/security/advisories/GHSA-v3vm-9h66-wm76 - Not Applicable, Third Party Advisory | |
References | () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00657.html - Not Applicable, Third Party Advisory | |
References | () https://sconedocs.github.io/release5.8/ - Release Notes | |
References | () https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html#inpage-nav-3-2-2 - Not Applicable, Third Party Advisory | |
References | () https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/stale-data-read-from-xapic.html - Not Applicable, Third Party Advisory | |
References | () https://jovanbulck.github.io/files/oakland24-pandora.pdf - Technical Description | |
References | () https://sconedocs.github.io/release5.7/ - Release Notes | |
CPE | cpe:2.3:a:scontain:scone:*:*:*:*:*:*:*:* cpe:2.3:a:intel:software_guard_extensions:-:*:*:*:*:*:*:* |
|
First Time |
Intel
Scontain scone Scontain Intel software Guard Extensions |
|
CWE | NVD-CWE-noinfo | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
30 Dec 2023, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-30 03:15
Updated : 2024-02-28 20:54
NVD link : CVE-2023-38023
Mitre link : CVE-2023-38023
CVE.ORG link : CVE-2023-38023
JSON object : View
Products Affected
scontain
- scone
intel
- software_guard_extensions
CWE