CVE-2022-46487

Published: Dic 30, 2023 Last Modified: Apr 17, 2025
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 7,8
Attack Vector: local
Attack Complexity: low
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high

Description

AI Translation Available

Improper initialization of x87 and SSE floating-point configuration registers in the __scone_entry component of SCONE before 5.8.0 for Intel SGX allows a local attacker to compromise the execution integrity of floating-point operations in an enclave or access sensitive information via side-channel analysis.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0017
Percentile
0,4th
Updated

EPSS Score Trend (Last 90 Days)

665

Improper Initialization

Draft
Common Consequences
Security Scopes Affected:
Confidentiality Access Control Availability
Potential Impacts:
Read Memory Read Application Data Bypass Protection Mechanism Dos: Crash, Exit, Or Restart
Applicable Platforms
All platforms may be affected
View CWE Details
Application

Scone by Scontain

Version Range Affected
To 5.8.0 (exclusive)
cpe:2.3:a:scontain:scone:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://jovanbulck.github.io/files/acsac20-fpu.pdf
https://jovanbulck.github.io/files/oakland24-pandora.pdf
https://nvd.nist.gov/vuln/detail/CVE-2020-0561#vulnCurrentD…
Third Party Advisory US Government Resource
https://nvd.nist.gov/vuln/detail/CVE-2020-0561#vulnCurrentDescriptionTitle
https://nvd.nist.gov/vuln/detail/CVE-2020-15107
Third Party Advisory US Government Resource
https://nvd.nist.gov/vuln/detail/CVE-2020-15107
https://sconedocs.github.io/release5.7/
https://www.intel.com/content/www/us/en/developer/articles/technical/software-s…
https://jovanbulck.github.io/files/acsac20-fpu.pdf
https://jovanbulck.github.io/files/oakland24-pandora.pdf
https://nvd.nist.gov/vuln/detail/CVE-2020-0561#vulnCurrentD…
Third Party Advisory US Government Resource
https://nvd.nist.gov/vuln/detail/CVE-2020-0561#vulnCurrentDescriptionTitle
https://nvd.nist.gov/vuln/detail/CVE-2020-15107
Third Party Advisory US Government Resource
https://nvd.nist.gov/vuln/detail/CVE-2020-15107
https://sconedocs.github.io/release5.7/
https://www.intel.com/content/www/us/en/developer/articles/technical/software-s…