CVE-2024-28885

5.9 MEDIUM

📋 TL;DR

This vulnerability in Intel QAT Engine for OpenSSL before version 1.6.1 allows an attacker to infer sensitive information through timing discrepancies in cryptographic operations. It affects systems using Intel Quick Assist Technology acceleration for OpenSSL. The risk is primarily to systems processing network traffic with QAT-enabled OpenSSL.

💻 Affected Systems

Products:
  • Intel QAT Engine for OpenSSL
Versions: All versions before v1.6.1
Operating Systems: Linux, Windows, Other platforms with QAT support
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Intel QAT hardware acceleration enabled and using OpenSSL with QAT Engine.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could recover cryptographic keys or other sensitive data through timing side-channel analysis, potentially compromising TLS/SSL encrypted communications.

🟠

Likely Case

Information leakage allowing partial recovery of encrypted data or inference of cryptographic operations, potentially weakening security of TLS connections.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to potential information disclosure rather than full system compromise.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: HIGH

Exploitation requires precise timing measurements and network access to vulnerable services.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v1.6.1

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01177.html

Restart Required: Yes

Instructions:

1. Download Intel QAT Engine v1.6.1 or later from Intel's website. 2. Stop services using OpenSSL with QAT. 3. Install the updated QAT Engine. 4. Restart affected services.

🔧 Temporary Workarounds

Disable QAT Engine

all

Temporarily disable Intel QAT acceleration in OpenSSL configuration

Modify OpenSSL configuration to remove QAT engine loading

Network Segmentation

all

Restrict network access to services using QAT-enabled OpenSSL

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure
  • Monitor for unusual timing patterns in cryptographic operations

🔍 How to Verify

Check if Vulnerable:

Check QAT Engine version: openssl engine -t qat

Check Version:

openssl engine -t qat | grep -i version

Verify Fix Applied:

Verify QAT Engine version is 1.6.1 or higher: openssl engine -t qat

📡 Detection & Monitoring

Log Indicators:

  • Unusual timing patterns in SSL/TLS handshake logs
  • Multiple failed cryptographic operations from single sources

Network Indicators:

  • Repeated SSL/TLS connections with timing measurements
  • Unusual packet timing patterns to cryptographic services

SIEM Query:

source="ssl_logs" AND (event="handshake" AND duration>threshold) OR (source_ip repeated_connections AND protocol="TLS")

🔗 References

📤 Share & Export