CVE-2024-31074

5.9 MEDIUM

📋 TL;DR

This vulnerability in Intel QAT Engine for OpenSSL allows attackers to infer sensitive information through timing side-channel attacks during cryptographic operations. It affects systems using vulnerable versions of Intel QAT Engine for OpenSSL before v1.6.1. The risk primarily impacts systems performing cryptographic operations over networks.

💻 Affected Systems

Products:
  • Intel QAT Engine for OpenSSL
Versions: All versions before v1.6.1
Operating Systems: Linux, Windows, Other platforms using Intel QAT Engine
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Intel QAT Engine enabled and performing cryptographic operations. Requires network access to observe timing differences.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could recover private keys or other cryptographic secrets through timing analysis, potentially compromising TLS/SSL connections and encrypted data.

🟠

Likely Case

Information leakage about cryptographic operations, potentially revealing partial information about encrypted data or keys in controlled network environments.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, though timing attacks remain difficult to fully mitigate without patching.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: HIGH

Timing attacks require precise measurements and controlled conditions. Exploitation is non-trivial but possible with sufficient resources.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v1.6.1

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01177.html

Restart Required: Yes

Instructions:

1. Download Intel QAT Engine v1.6.1 or later from Intel's website. 2. Stop services using QAT Engine. 3. Install the updated version. 4. Restart affected services. 5. Verify the update was successful.

🔧 Temporary Workarounds

Disable QAT Engine

all

Temporarily disable Intel QAT Engine to eliminate the vulnerability

Modify OpenSSL configuration to remove QAT Engine loading
Set OPENSSL_ENGINES environment variable to exclude QAT

Network Rate Limiting

linux

Implement network traffic shaping to obscure timing differences

Use tc or similar tools to add jitter to network traffic

🧯 If You Can't Patch

  • Implement strict network segmentation to limit access to systems using QAT Engine
  • Monitor for unusual network patterns and timing analysis attempts

🔍 How to Verify

Check if Vulnerable:

Check QAT Engine version: openssl engine -t qat

Check Version:

openssl engine -c qat | grep -i version

Verify Fix Applied:

Verify version is v1.6.1 or later: openssl engine -c qat

📡 Detection & Monitoring

Log Indicators:

  • Unusual timing patterns in cryptographic operations
  • Multiple failed connection attempts with precise timing

Network Indicators:

  • Abnormally consistent request-response timing patterns
  • Repeated cryptographic operations from single sources

SIEM Query:

source="network_traffic" AND (event_type="tls_handshake" OR event_type="crypto_op") AND response_time < threshold

🔗 References

📤 Share & Export