CVE-2024-29970

9.8 CRITICAL

📋 TL;DR

Fortanix Enclave OS has an interface vulnerability that allows attackers to inject signals, leading to state corruption. This affects systems running Fortanix Enclave OS 3.36.1941-EM, potentially compromising the integrity of enclave operations.

💻 Affected Systems

Products:
  • Fortanix Enclave OS
Versions: 3.36.1941-EM
Operating Systems: Linux-based enclave environments
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects the EM (Enterprise Management) version of Enclave OS

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of enclave security, allowing unauthorized access to protected data and execution of arbitrary code within the enclave environment.

🟠

Likely Case

Enclave state corruption leading to denial of service, data integrity issues, or unauthorized information disclosure from within the enclave.

🟢

If Mitigated

Limited impact if enclaves are properly isolated and signal handling is restricted, though some state corruption may still occur.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Proof of concept available on GitHub demonstrates signal injection technique

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Fortanix support for latest patched version

Vendor Advisory: https://support.fortanix.com/hc/en-us/sections/360012461751-Enclave-OS

Restart Required: Yes

Instructions:

1. Check Fortanix support portal for latest security advisory
2. Download and apply the patched version of Enclave OS
3. Restart all affected enclave instances
4. Verify patch application and enclave functionality

🔧 Temporary Workarounds

Signal Filtering

linux

Implement signal filtering at the host level to block suspicious signal injections

Configure host signal handlers to validate and filter incoming signals to enclaves

Enclave Isolation

linux

Increase isolation between enclaves to limit potential lateral movement

Implement stricter namespace and cgroup isolation for enclave processes

🧯 If You Can't Patch

  • Isolate affected systems from untrusted networks
  • Implement strict access controls and monitoring for enclave signal handling

🔍 How to Verify

Check if Vulnerable:

Check Enclave OS version: if running 3.36.1941-EM, system is vulnerable

Check Version:

Check Enclave OS documentation for version verification command specific to your deployment

Verify Fix Applied:

Verify Enclave OS version is updated beyond 3.36.1941-EM and test signal handling functionality

📡 Detection & Monitoring

Log Indicators:

  • Unexpected signal delivery to enclave processes
  • Enclave state corruption errors
  • Abnormal enclave termination

Network Indicators:

  • Unusual inter-process communication patterns
  • Signal injection attempts from unauthorized sources

SIEM Query:

Search for process signal delivery anomalies and enclave error states in system logs

🔗 References

📤 Share & Export