CVE-2022-21163

8.4 HIGH

📋 TL;DR

This vulnerability in Intel SGX Crypto API Toolkit allows authenticated local users to bypass access controls and potentially escalate privileges. It affects systems using Intel SGX with vulnerable versions of the Crypto API Toolkit. The risk is limited to authenticated local attackers.

💻 Affected Systems

Products:
  • Intel SGX Crypto API Toolkit
Versions: All versions before commit ID 91ee496 (version 2.0)
Operating Systems: Linux, Windows with Intel SGX support
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Intel SGX enabled hardware and vulnerable Crypto API Toolkit installation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker gains full system control through privilege escalation, potentially compromising SGX enclave security and sensitive data.

🟠

Likely Case

Local authenticated user escalates privileges to gain unauthorized access to SGX enclaves or system resources.

🟢

If Mitigated

With proper access controls and patching, impact is limited to denial of service at most.

🌐 Internet-Facing: LOW - Requires local authenticated access, not remotely exploitable.
🏢 Internal Only: HIGH - Local authenticated users can exploit this for privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local authenticated access and knowledge of SGX environment.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 2.0 (commit ID 91ee496 or later)

Vendor Advisory: http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00746.html

Restart Required: Yes

Instructions:

1. Download latest Intel SGX Crypto API Toolkit from Intel website. 2. Stop SGX services. 3. Install updated toolkit. 4. Restart system. 5. Verify version is 2.0 or later.

🔧 Temporary Workarounds

Restrict local user access

all

Limit local user accounts and implement strict access controls on SGX-enabled systems.

Disable SGX if not required

all

Disable Intel SGX in BIOS/UEFI settings if not essential for operations.

🧯 If You Can't Patch

  • Implement strict least-privilege access controls for all local user accounts
  • Monitor SGX-related processes and logs for unusual privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check Crypto API Toolkit version: sgx_crypto_toolkit --version or examine installation directory for version files.

Check Version:

sgx_crypto_toolkit --version

Verify Fix Applied:

Verify version is 2.0 or later and commit ID is 91ee496 or newer.

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation attempts
  • SGX Crypto API Toolkit access violations
  • Failed access control events in SGX logs

Network Indicators:

  • None - local exploit only

SIEM Query:

source="sgx_logs" AND (event_type="access_violation" OR event_type="privilege_escalation")

🔗 References

📤 Share & Export