CVE-2024-21801
📋 TL;DR
This vulnerability in Intel TDX module software allows privileged users to potentially cause denial of service through local access. It affects systems using Intel Trust Domain Extensions (TDX) technology for confidential computing. The issue stems from insufficient control flow management in the TDX module.
💻 Affected Systems
- Intel TDX Module
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
A privileged attacker could crash the TDX module, disrupting all trusted domains and confidential computing workloads running on the affected system.
Likely Case
Malicious administrators or compromised privileged accounts could intentionally or accidentally trigger the vulnerability, causing service disruption to TDX-protected workloads.
If Mitigated
With proper access controls limiting privileged user access and monitoring for suspicious activity, the impact would be limited to authorized administrators making mistakes.
🎯 Exploit Status
Exploitation requires local privileged access. The vulnerability is in control flow management, suggesting it could be triggered through specific privileged operations.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.5.05.46.698 or later
Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01070.html
Restart Required: Yes
Instructions:
1. Check current TDX module version. 2. Download updated TDX module from Intel. 3. Update TDX module following Intel's documentation. 4. Reboot system to load new module.
🔧 Temporary Workarounds
Restrict Privileged Access
allLimit access to privileged accounts that could exploit this vulnerability
Disable TDX if Not Required
allDisable Intel TDX functionality if confidential computing is not needed
Check BIOS/UEFI settings for TDX/Trust Domain Extensions and disable if present
🧯 If You Can't Patch
- Implement strict access controls to limit who has privileged access to affected systems
- Monitor privileged user activity and implement anomaly detection for suspicious TDX module operations
🔍 How to Verify
Check if Vulnerable:
Check TDX module version using 'tdx_module --version' or examine system logs for TDX module version information
Check Version:
tdx_module --version
Verify Fix Applied:
Verify TDX module version is 1.5.05.46.698 or later and test TDX functionality remains operational
📡 Detection & Monitoring
Log Indicators:
- Unexpected TDX module crashes or restarts
- Privileged user operations on TDX module
Network Indicators:
- None - this is a local vulnerability
SIEM Query:
Search for: 'TDX module crash' OR 'trust domain extension failure' OR privileged user accessing TDX control interfaces