First published: Tue Dec 15 2020(Updated: )
An arbitrary memory overwrite vulnerability in Asylo versions up to 0.6.0 allows an attacker to make a host call to UntrustedCall. UntrustedCall failed to validate the buffer range within sgx_params and allowed the host to return a pointer that was an address within the enclave memory. This allowed an attacker to read memory values from within the enclave.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Products | <=0.6.0 |
Upgrade past commit 83036fd841d33baa7e039f842d131aa7881fdcc2
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-8936 is considered high due to its potential for arbitrary memory overwrite.
To fix CVE-2020-8936, upgrade to Asylo version 0.6.1 or later where the vulnerability is addressed.
CVE-2020-8936 affects all versions of Asylo up to and including 0.6.0.
CVE-2020-8936 is vulnerable to arbitrary memory overwrite attacks that can lead to exposure of sensitive data.
Organizations using affected versions of Google Asylo for secure enclaves are impacted by CVE-2020-8936.