Test attack exposes Intel SGX security vulnerabilities  

by Don Sharpe
Don Sharpe
Don Sharpe
Don has been writing professionally for over 10 years now, but his passion for the written word started back in his elementary school days. His work has been... read more
Affiliate Disclosure
  • A recently published proof of concept exposes security weaknesses in Intel SGX or Software Guard Extensions.
  • Researchers successfully breached SGX enclaves and accessed confidential data.
  • Check out our Intel section to catch up with the latest on Intel processors. 
  • As always, you may visit the Security & Privacy page for tips on securing your Windows 10 PC.
Intel SGX vulnerability

To fix Windows PC system issues, you will need a dedicated tool

  • Download Fortect and install it on your PC
  • Start the tool's scanning process to look for corrupt files that are the source of your problem
  • Right-click on Start Repair so the tool can start the fixing algorithm
Download Now Fortect has been downloaded by 0 readers this month, rated 4.4 on TrustPilot

A recently published proof of concept exposes security weaknesses in Intel SGX or Software Guard Extensions. The report comes amid the growing sophistication of cyber threats, which has demonstrated that software-based antimalware tools alone are inadequate.

As such, tech companies like Microsoft are advocating for hardware-backed reinforcements to traditional software protections.

Intel SGX chips fail SGAxe test attack

Cybersecurity researchers successfully breached Intel SGX enclaves.

They demonstrated that it’s possible to access data protected within the enclaves by bypassing all the countermeasures Intel has in place.

We then proceed to show an extraction of SGX private attestation keys from within SGX’s quoting enclave, as compiled and signed by Intel. With these keys in hand, we are able to sign fake attestation quotes, just as if these have initiated from trusted and genuine SGX enclaves.

In the test attack, the researchers were able to steal protected data, which should be difficult when it comes to Intel SGX. Essentially, the technology allows developers to partition confidential information in hardware-secured enclaves.

The experiment proved that code executed at higher privilege levels can breach the SGX ecosystem.

SGAxe is a transformed version of CacheOut, which is also a security vulnerability in certain Intel microchips.

Intel has published the full list of vulnerable processors.

While there’s no evidence of any SGAxe exploit in the wild, hackers can still draw inspiration from the available proof of concept to get started. So, hopefully, Intel will release micro-updates to patch the affected chips soon enough.

10th Generation Intel Core processors are not in the list of affected chips, though. That should be good news, considering that one of their key selling points is their best-in-class built-in security.

Do you think hardware-backed PC security, such as Intel SGX enclaves, is the way to go? You can always share your thoughts in the comments section below.

This article covers:Topics: