Vulnerability Description
An arbitrary memory write vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to ecall_restore using the attribute output which fails to check the range of a pointer. An attacker can use this pointer to write to arbitrary memory addresses including those within the secure enclave We recommend upgrading past commit 382da2b8b09cbf928668a2445efb778f76bd9c8a
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Asylo | <= 0.6.0 |
Related Weaknesses (CWE)
References
- https://github.com/google/asylo/commit/382da2b8b09cbf928668a2445efb778f76bd9c8aExploitThird Party Advisory
- https://github.com/google/asylo/commit/382da2b8b09cbf928668a2445efb778f76bd9c8aExploitThird Party Advisory
FAQ
What is CVE-2020-8944?
CVE-2020-8944 is a vulnerability with a CVSS score of 5.3 (MEDIUM). An arbitrary memory write vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to ecall_restore using the attribute output which fails to check the range of a pointe...
How severe is CVE-2020-8944?
CVE-2020-8944 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-8944?
Check the references section above for vendor advisories and patch information. Affected products include: Google Asylo.