Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Intel Faces SGX Vulnerability Concerns

August 29, 2024
Reading Time: 2 mins read
in Alerts
Yokai Backdoor Targets Thai Officials

Intel has addressed concerns following revelations by security researcher Mark Ermolov about vulnerabilities in the company’s Software Guard Extensions (SGX) data protection technology. Ermolov, affiliated with the Russian cybersecurity firm Positive Technologies, announced that his team successfully extracted cryptographic keys linked to Intel SGX, which is designed to safeguard code and data from both software and hardware attacks through its trusted execution environment, known as an enclave. He identified the extraction of the SGX Fuse Key0 (FK0), also referred to as the Root Provisioning Key, and its associated Root Sealing Key (FK1) as significant threats that could compromise the entire security framework of SGX.

Pratyush Ranjan Tiwari, a cryptography expert from Johns Hopkins University, elaborated on the implications of this research, emphasizing that access to FK0 could allow an attacker to decrypt sealed data and produce counterfeit attestation reports, thereby undermining SGX’s intended security guarantees. While the affected processors, such as Apollo Lake and Gemini Lake, have reached the end of their life cycles, they remain prevalent in embedded systems, raising concerns about the continued risk these vulnerabilities pose.

In response to these claims, Intel clarified that the research was conducted on systems to which the researchers had physical access, and these systems were not equipped with the latest mitigations or configurations. Intel noted that the vulnerabilities exploited were previously mitigated and dated back to 2017, stating that the findings were not unexpected. Furthermore, the key extracted by the researchers remains encrypted, necessitating that the encryption must be broken for malicious use, which would only be applicable to the specific system involved in the attack.

Ermolov acknowledged that while the extracted key is encrypted with a Fuse Encryption Key (FEK) or Global Wrapping Key (GWK), he is optimistic about the potential for decryption, referencing previous successful attempts to obtain similar keys. He also pointed out that the GWK is shared across all chips of the same microarchitecture, suggesting that if an attacker were to acquire the GWK, they could potentially decrypt the FK0 for any chip within that architecture. Ermolov concluded that the primary risk of the leak of the Intel SGX Root Provisioning Key lies in the ability to forge Intel SGX Remote Attestation, which is meant to verify that software is securely operating within an Intel SGX enclave.

 

Reference:

  • Intel SGX Key Disclosure Claim

Tags: August 2024Cyber AlertsCyber Alerts 2024Cyber ScamsCyber threatsIntelSoftware Guard Extensions (SGX)Vulnerabilities
ADVERTISEMENT

Related Posts

Hackers Use Leaked Shellter License Malware

Windows BitLocker Vulnerability Flaw

July 9, 2025
Hackers Use Leaked Shellter License Malware

Hackers Use Leaked Shellter License Malware

July 9, 2025
Hackers Use Leaked Shellter License Malware

Anatsa Android Trojan Targets 90K Users

July 9, 2025
AMOS Mac Stealer Adds Persistent Backdoor

AMOS Mac Stealer Adds Persistent Backdoor

July 8, 2025
AMOS Mac Stealer Adds Persistent Backdoor

NordDragonScan Malware Steals Windows Data

July 8, 2025
AMOS Mac Stealer Adds Persistent Backdoor

New Ransomware BERT Targets ESXi Systems

July 8, 2025

Latest Alerts

Windows BitLocker Vulnerability Flaw

Anatsa Android Trojan Targets 90K Users

Hackers Use Leaked Shellter License Malware

New Ransomware BERT Targets ESXi Systems

NordDragonScan Malware Steals Windows Data

AMOS Mac Stealer Adds Persistent Backdoor

Subscribe to our newsletter

    Latest Incidents

    Credit Reports Breached And Sold On Dark Web

    Recruiting Software Exposed 26M Resumes

    Norwegian Municipalities Hit by Data Breach

    French Chip Firm Semco Hacked During IPO

    Louis Vuitton Korea Hit By Cyberattack

    Virginia School District Hit By Cyberattack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial