On-Prem

Systems

Intel's Software Guard Extensions broken? Don't panic

More of a storm in a teacup


Today's news that Intel's Software Guard Extensions (SGX) security system is open to abuse may be overstated.

The issue, highlighted by Positive Technologies Russian researcher Mark Ermolov, would give an attacker full access to SGX's secure enclaves thanks to a coding slip-up. It looks like supposedly secure data could be accessible in end-of-life Gemini client and server systems, and possibly older but supported Xeons too.

"After years of research we finally extracted Intel SGX Fuse Key0, AKA Root Provisioning Key. Together with FK1 or Root Sealing Key (also compromised), it represents Root of Trust for SGX," Ermolov posted.

"They really tried hard to [protect] the key: the part of ucode works perfectly but they forgot to clear the internal buffer in the core IP holding all fuses (including FK0) acquired from Fuse Controller."

This could be seriously bad news. Key0 access would give complete access to any secured data in SGX, and while Intel has retired the system for client processors, there are still a lot of them in circulation – particularly in embedded systems.

However, Intel has pointed out that not only would an attacker need physical access to a machine to make this work, but that string of issues would have to have been left unfixed.

"What Positive Technologies seems to have found is expected based on previous mitigated vulnerabilities in DFX Aggregator logic, requiring physical access to Gemini Lake systems without Intel Firmware Version Control capability.

"An attacker must have physical access to an unmitigated system impacted by prior vulnerabilities (CVE-2017-5705, CVE-2017-5706, CVE-2017-5707, CVE-2019-0090) that allow Intel Unlock state to be achieved. Intel has provided mitigations for these prior vulnerabilities."

That said, there are a lot of Gemini processors out there. Obviously, it is not in the high-performance area - Gemini was retired last year by Intel. But they are still lurking around.

"Anything running on these processors used in an enclave, immediately look at stopping that for the affected platforms," Johns Hopkins boffin Pratyush Ranjan Tiwari told The Register. "It's totally possible all of these trusted enclaves can't be trusted at all."

The problem lies in the software used to lock down SGX, according to Tiwari. The bad coding would allow an attacker to grab the access rights to SGX-locked material, although it's not clear if this can be done remotely or would require local access.

SGX was introduced in 2015 with the Skylake processors range and was supposed to protect key code even from the manufacturer itself, but quickly ran into problems. It has been deprecated in later chips but is still around, and there are a lot of embedded systems that rely on it. ®

Send us news
9 Comments

Intel Arrow Lake to be made elsewhere as 20A process node canned

Meanwhile, Broadcom reportedly displeased with 18A wafers

Intel's 120 TOPS Lunar Lake AI PC chips have landed

And all it took was some good old fashioned outsourcing to TSMC

Gelsinger opens up about Intel troubles amid talk of possible split

From spinoffs to layoffs and a boardroom revolt, 2024 isn't going great for Chipzilla

Microsoft hosts a security summit but no press, public allowed

CrowdStrike, other vendors, friendly govt reps…but not anyone who would tell you what happened

Dow-ward spiral: Intel share price drop could see it delisted from blue-chip index

50% dive in market cap during 2024 forcing CEO Pat Gelsinger to revisit strategy

Microsoft patches scary wormable hijack-my-box-via-IPv6 security bug and others

Plus more pain for Intel which fixed 43 bugs, SAP and Adobe also in on the action

Intel enlists Morgan Stanley to defend against activist investors

Multiple lawsuits doesn't mean investors are coming for the board yet, but better safe than sorry, right?

Security biz Verkada to pay $3M penalty under deal that also enforces infosec upgrade

Allowed access to 150K cameras, some in sensitive spots, but has been done for spamming

Security boom is over, with over a third of CISOs reporting flat or falling budgets

Good news? Security is still getting a growing part of IT budget

White House thinks it's time to fix the insecure glue of the internet: Yup, BGP

Better late than never

Alleged Karakut ransomware scumbag charged in US

Plus: Microsoft issues workaround for dual-boot crashes; ARRL cops to ransom payment, and more

CrowdStrike's meltdown didn't dent its market dominance … yet

Total revenue for Q2 grew 32 percent