SmashEx|SmashEx-demo
SmashEx|SmashEx-demo

New SmashEx attack breaks Intel SGX enclaves

Academics from universities in China, Singapore, and Switzerland have discovered a new attack method that can break the sanctity of Intel SGX enclaves and steal confidential data from inside an Intel CPU's most secure area.

Named SmashEx, the attack impacts the Intel Software Guard eXtensions, also known as Intel SGX, a feature of almost all modern Intel processors that allows an OS or application to put sensitive data and operations inside a cryptographically secure area of the CPU named an "enclave."

The SmashEx attack allows hostile software running on the same OS to abuse a feature that allows the CPU to pause SGX operations to enter the enclave and retrieve data. A high-level explanation provided by the research team is available below:

For normal functioning, the SGX design allows the OS to interrupt the enclave execution through configurable hardware exceptions at any point. This feature enables enclave runtimes (e.g., Intel SGX SDK and Microsoft Open Enclave) to support in-enclave exception or signal handling, but it also opens up enclaves to re-entrancy bugs. SmashEx is an attack which exploits enclave SDKs which do not carefully handle re-entrancy in their exceptional handling safely, which is complex on SGX. The SmashEx proof-of-concept exploits enable code reuse (e.g., ROP) and confidential data disclosure attacks in enclaves built with vulnerable enclave runtimes.

Researchers said that tests they carried out were successful in retrieving an RSA encryption key from inside an Intel SGX enclave used by a server to encrypt HTTPS traffic, and they were also able to dump the contents handled by the cURL app from inside a Microsoft Open Enclave, an enclave software toolkit used by Azure servers.

2021-10-SmashEx-demo-1024x284.png

Over the past few years, we've seen similar attacks that broke SGX enclaves to retrieve data. Past examples include PlunderVoltSgxSpectreForeshadowBranchScopePlatypusV0LTpwnGame of ThreadsAsyncShockThe Guard's Dilemma, and Iago.

In addition, a 2019 study of eight popular enclave software development kits, software libraries that are used by app makers to allow their apps to interact and store data inside enclaves, found 35 different vulnerabilities across all tested SDKs, including SGX.

But researchers say that the SmashEx attack is far more dangerous than the ones listed above, as it doesn't merely just leak data from inside SGX enclaves but can also corrupt it—if needed.

Patches are available

As a result, details about the SmashEx attack were only published yesterday, on a dedicated website, after both Intel and Microsoft released patches to address the issue in their respective SDKs—namely the Intel SGX SDK (CVE-2021-0186) and the Open Enclave SDK (CVE-2021-33767).

To prevent attacks, applications that like to store sensitive information inside SGX enclaves will have to incorporate these updates in their code.

However, the research team says that there are many other SDKs that are affected by the SmashEx attack, whose developers will now have to issue their own set of patches, including SGX SDKs from Google, Apache, and Arm.

RuntimeVendorAffected SGX generations
Intel SGX SDKIntelSGX2
Open EnclaveMicrosoftSGX1 and SGX2
Google AsyloGoogleSGX2
EdgelessRTEdgeless SystemsSGX1 and SGX2
Rust SGX SDKApacheSGX2
TeaclaveApacheSGX2
SGX-LKLImperial College LondonSGX1 and SGX2
CoSMIXTechnionSGX2
VeracruzARMSGX2
Get more insights with the
Recorded Future
Intelligence Cloud.
Learn more.
No previous article
No new articles
Catalin Cimpanu

Catalin Cimpanu

is a cybersecurity reporter who previously worked at ZDNet and Bleeping Computer, where he became a well-known name in the industry for his constant scoops on new vulnerabilities, cyberattacks, and law enforcement actions against hackers.