CVE-2024-21801

7.1 HIGH

📋 TL;DR

This vulnerability in Intel TDX module software allows privileged users to potentially cause denial of service through local access. It affects systems using Intel Trust Domain Extensions (TDX) technology for confidential computing. The issue stems from insufficient control flow management in the TDX module.

💻 Affected Systems

Products:
  • Intel TDX Module
Versions: All versions before 1.5.05.46.698
Operating Systems: Linux distributions supporting Intel TDX
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Intel TDX enabled and using vulnerable TDX module software. Requires Intel processors with TDX support.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

A privileged attacker could crash the TDX module, disrupting all trusted domains and confidential computing workloads running on the affected system.

🟠

Likely Case

Malicious administrators or compromised privileged accounts could intentionally or accidentally trigger the vulnerability, causing service disruption to TDX-protected workloads.

🟢

If Mitigated

With proper access controls limiting privileged user access and monitoring for suspicious activity, the impact would be limited to authorized administrators making mistakes.

🌐 Internet-Facing: LOW - This vulnerability requires local access and privileged credentials, making remote exploitation unlikely.
🏢 Internal Only: HIGH - Internal privileged users (administrators, root users) have the access required to exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local privileged access. The vulnerability is in control flow management, suggesting it could be triggered through specific privileged operations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.5.05.46.698 or later

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01070.html

Restart Required: Yes

Instructions:

1. Check current TDX module version. 2. Download updated TDX module from Intel. 3. Update TDX module following Intel's documentation. 4. Reboot system to load new module.

🔧 Temporary Workarounds

Restrict Privileged Access

all

Limit access to privileged accounts that could exploit this vulnerability

Disable TDX if Not Required

all

Disable Intel TDX functionality if confidential computing is not needed

Check BIOS/UEFI settings for TDX/Trust Domain Extensions and disable if present

🧯 If You Can't Patch

  • Implement strict access controls to limit who has privileged access to affected systems
  • Monitor privileged user activity and implement anomaly detection for suspicious TDX module operations

🔍 How to Verify

Check if Vulnerable:

Check TDX module version using 'tdx_module --version' or examine system logs for TDX module version information

Check Version:

tdx_module --version

Verify Fix Applied:

Verify TDX module version is 1.5.05.46.698 or later and test TDX functionality remains operational

📡 Detection & Monitoring

Log Indicators:

  • Unexpected TDX module crashes or restarts
  • Privileged user operations on TDX module

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

Search for: 'TDX module crash' OR 'trust domain extension failure' OR privileged user accessing TDX control interfaces

🔗 References

📤 Share & Export