Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-796p-j2gh-9m2q

Опубликовано: 26 янв. 2026
Источник: github
Github: Прошло ревью
CVSS4: 9.3

Описание

dcap-qvl has Missing Verification for QE Identity

Impact

This vulnerability involves a critical gap in the cryptographic verification process within the dcap-qvl.

The library fetches QE Identity collateral (including qe_identity, qe_identity_signature, and qe_identity_issuer_chain) from the PCCS. However, it skips to verify the QE Identity signature against its certificate chain and does not enforce policy constraints on the QE Report.

Consequences

An attacker can forge the QE Identity data to whitelist a malicious or non-Intel Quoting Enclave. This allows the attacker to forge the QE and sign untrusted quotes that the verifier will accept as valid. Effectively, this bypasses the entire remote attestation security model, as the verifier can no longer trust the entity responsible for signing the quotes.

Who is impacted

All deployments utilizing the dcap-qvl library for SGX or TDX quote verification are affected.

Patches

The vulnerability has been patched in dcap-qvl version 0.3.9. The fix implements the missing cryptographic verification for the QE Identity signature and enforces the required checks for MRSIGNER, ISVPRODID, and ISVSVN against the QE Report.

Users of the @phala/dcap-qvl-node and @phala/dcap-qvl-web packages should switch to the pure JavaScript implementation, @phala/dcap-qvl.

Workarounds

There are no known workarounds for this vulnerability. Users must upgrade to the patched version to ensure that QE Identity collateral is properly verified.

Credit

This bug was reported by Rahul Saxena saxenism@bluethroatlabs.com.

Пакеты

Наименование

dcap-qvl

rust
Затронутые версииВерсия исправления

< 0.3.9

0.3.9

Наименование

@phala/dcap-qvl

npm
Затронутые версииВерсия исправления

<= 0.3.0

0.3.9

Наименование

@phala/dcap-qvl-web

npm
Затронутые версииВерсия исправления

<= 0.3.3

Отсутствует

Наименование

@phala/dcap-qvl-node

npm
Затронутые версииВерсия исправления

<= 0.3.3

Отсутствует

Наименование

dcap-qvl

pip
Затронутые версииВерсия исправления

< 0.3.9

0.3.9

EPSS

Процентиль: 2%
0.00013
Низкий

9.3 Critical

CVSS4

Дефекты

CWE-295
CWE-347

Связанные уязвимости

nvd
11 дней назад

dcap-qvl implements the quote verification logic for DCAP (Data Center Attestation Primitives). A vulnerability present in versions prior to 0.3.9 involves a critical gap in the cryptographic verification process within the dcap-qvl. The library fetches QE Identity collateral (including qe_identity, qe_identity_signature, and qe_identity_issuer_chain) from the PCCS. However, it skips to verify the QE Identity signature against its certificate chain and does not enforce policy constraints on the QE Report. An attacker can forge the QE Identity data to whitelist a malicious or non-Intel Quoting Enclave. This allows the attacker to forge the QE and sign untrusted quotes that the verifier will accept as valid. Effectively, this bypasses the entire remote attestation security model, as the verifier can no longer trust the entity responsible for signing the quotes. All deployments utilizing the dcap-qvl library for SGX or TDX quote verification are affected. The vulnerability has been patche

EPSS

Процентиль: 2%
0.00013
Низкий

9.3 Critical

CVSS4

Дефекты

CWE-295
CWE-347