Cyber Posture

CVE-2024-29970

Critical

Published: 10 January 2025

Published
10 January 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0028 51.3th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Fortanix Enclave OS 3.36.1941-EM has an interface vulnerability that leads to state corruption via injected signals.

Security Summary

Fortanix Enclave OS version 3.36.1941-EM is affected by CVE-2024-29970, an interface vulnerability that enables state corruption through injected signals. This flaw, published on 2025-01-10, carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity with high impacts on confidentiality, integrity, and availability.

The vulnerability allows remote attackers with network access to exploit it without authentication, privileges, or user interaction, due to its low attack complexity and unchanged scope. Successful exploitation leads to state corruption within the enclave, potentially enabling full compromise of the protected environment.

Mitigation details and advisories are referenced in Fortanix's Enclave OS support section at https://support.fortanix.com/hc/en-us/sections/360012461751-Enclave-OS, along with a proof-of-concept at https://github.com/ahoi-attacks/sigy/blob/main/pocs/enclaveos/cve.md. Security practitioners should consult these resources for patching instructions and updates.

Details

CWE(s)
None listed

References