Intel® Software Guard Extensions (Intel® SGX)
Discussion board focused on hardware-based isolation and memory encryption to provide extended code protection in solutions.
1545 Discussions

Intel operational update – recommendation to refresh Intel SGX/TDX PCK CRL

Scott_R_Intel
Moderator
109 Views

Recently Intel issued a security announcement in response to academic research, known as TEE.fail, that attacked Intel SGX-based attestation. As part of their work on TEE.fail, the authors implemented an automated bot to create fake attestations with a genuine Intel SGX attestation key. Intel has been working to limit any potential impact of the quotes generated from the TEE.fail bot by updating the Intel SGX/TDX Certificate Revocation Lists (CRLs) materials. Note that the zip file with sample verification tool provided with the bot uses a cached CRL that will continue to pass if used (the CRL in the zip file has not been refreshed).

A verifier using the updated CRL available from Intel’s services should now cause an Intel SGX or Intel TDX quote generated by the TEE.fail bot to fail attestation verification.

Action Requested for Intel SGX / TDX Verifiers:

Ensure your PCK CRL has been refreshed / updated after November 9, 2 pm Pacific Standard Time from the applicable Intel Service endpoint version your solution currently leverages:

Should you suspect a genuine attestation key is being used maliciously, you can always report this to Intel through Intel PSIRT.

Thank You,

Intel SGX & TDX Services Team

Labels (3)
0 Kudos
0 Replies
Reply