Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
asylo vulnerabilities and exploits
(subscribe to this query)
4.6
CVSSv2
CVE-2021-22548
An attacker can change the pointer to untrusted memory to point to trusted memory region which causes copying trusted memory to trusted memory, if the latter is later copied out, it allows for reading of memory regions from the trusted region. It is recommended to update past 0.6...
Google Asylo
4.6
CVSSv2
CVE-2021-22550
An attacker can modify the pointers in enclave memory to overwrite arbitrary memory addresses within the secure enclave. It is recommended to update past 0.6.3 or git commit https://github.com/google/asylo/commit/a47ef55db2337d29de19c50cd29b0deb2871d31c
Google Asylo
2.1
CVSSv2
CVE-2021-22552
An untrusted memory read vulnerability in Asylo versions up to 0.6.1 allows an untrusted malicious user to pass a syscall number in MessageReader that is then used by sysno() and can bypass validation. This can allow the malicious user to read memory from within the secure enclav...
Google Asylo
2.1
CVSSv2
CVE-2020-8937
An arbitrary memory overwrite vulnerability in Asylo versions up to 0.6.0 allows an malicious user to make a host call to enc_untrusted_create_wait_queue that uses a pointer queue that relies on UntrustedLocalMemcpy, which fails to validate where the pointer is located. This allo...
Google Asylo
2.1
CVSSv2
CVE-2020-8938
An arbitrary memory overwrite vulnerability in Asylo versions up to 0.6.0 allows an malicious user to make a host call to FromkLinuxSockAddr with attacker controlled content and size of klinux_addr which allows an malicious user to write memory values from within the enclave. We ...
Google Asylo
2.1
CVSSv2
CVE-2020-8940
An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted malicious user to make a call to enc_untrusted_recvmsg using an attacker controlled result parameter. The parameter size is unchecked allowing the malicious user to read memory locations outs...
Google Asylo
2.1
CVSSv2
CVE-2020-8941
An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted malicious user to make a call to enc_untrusted_inet_pton using an attacker controlled klinux_addr_buffer parameter. The parameter size is unchecked allowing the malicious user to read memory ...
Google Asylo
2.1
CVSSv2
CVE-2020-8944
An arbitrary memory write vulnerability in Asylo versions up to 0.6.0 allows an untrusted malicious user to make a call to ecall_restore using the attribute output which fails to check the range of a pointer. An attacker can use this pointer to write to arbitrary memory addresses...
Google Asylo
5.5
CVSSv2
CVE-2020-8904
An arbitrary memory overwrite vulnerability in the trusted memory of Asylo exists in versions before 0.6.0. As the ecall_restore function fails to validate the range of the output_len pointer, an attacker can manipulate the tmp_output_len value and write to an arbitrary location ...
Google Asylo
4
CVSSv2
CVE-2020-8905
A buffer length validation vulnerability in Asylo versions before 0.6.0 allows an malicious user to read data they should not have access to. The 'enc_untrusted_recvfrom' function generates a return value which is deserialized by 'MessageReader', and copied in...
Google Asylo
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-38002
CVE-2006-4304
CVE-2024-4336
CVE-2024-33437
CVE-2024-4340
CVE-2024-27956
privilege
insecure direct object reference
XSS
item search icon">CVE-2024-25938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »