New Physical Attacks Are Rapidly Undermining Secure Enclave Protections from Nvidia, AMD, and Intel

Unveiling Security Vulnerabilities in Trusted Execution Environments

Recent research highlights critical vulnerabilities in Trusted Execution Environments (TEEs), which are marketed as secure solutions for data protection across various hardware platforms. According to cybersecurity researcher Genkin, even the latest TEEs from multiple vendors remain susceptible to relatively inexpensive physical attacks, particularly those that exploit DDR5 traffic.

The research team demonstrated that the equipment needed for such attacks can be assembled with readily available components, costing under $1,000. Their portable device, designed to fit in a briefcase, enables attackers to infiltrate facilities containing TEE-protected servers. Notably, once the initial physical breach is executed, there is no requirement for further connection, allowing for greater operational freedom. For attackers running their own servers, this approach allows them to employ larger equipment without the need for obfuscation, which the researchers also constructed.

In their experiments, the researchers targeted a variety of services dependent on TEE protections, including BuilderNet, dstack, and Secret Network. Ethical considerations guided their approach, as they conducted tests on infrastructure that mirrored the targeted networks without directly infringing on them.

BuilderNet, a network of Ethereum block builders using TDX technology, aims to enhance data privacy and fairness in blockchain transactions. However, the research revealed that a malicious actor equipped with an attestation key could join this network and gain access to sensitive configuration details. This exploitation could extend to decrypting confidential order flows and accessing Ethereum wallets, empowering the attacker to construct arbitrary blocks or engage in front-running—creating transactions with higher fees to ensure priority execution—while maintaining plausible deniability.

At this time, BuilderNet has not announced any defenses in response to these vulnerabilities, and attempts to reach their representatives remain inconclusive. Similarly, dstack, which facilitates the development of confidential applications on Nvidia Confidential Compute, was shown to be vulnerable. Researchers utilized TEE.fail to forge attestations that claimed specific workloads were completed under TDX protection, thereby misleading trusted parties regarding GPU ownership.

These revelations underscore the pressing need for vigilance among businesses leveraging TEE technologies. Cybersecurity threats like these could have severe ramifications, leading to data breaches or financial loss.

Considering the tactics and techniques outlined in the MITRE ATT&CK framework, various adversary strategies could have influenced this attack, including initial access through physical infiltration and privilege escalation via forged attestations. As organizations increasingly depend on TEEs for data security, the findings from this research serve as a critical reminder to assess and reinforce cybersecurity measures against evolving threats.

Source