Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2021-33135: denial of service in Intel(R) SGX

0
Medium
VulnerabilityCVE-2021-33135cvecve-2021-33135
Published: Thu May 12 2022 (05/12/2022, 16:35:46 UTC)
Source: CVE
Vendor/Project: n/a
Product: Intel(R) SGX

Description

Uncontrolled resource consumption in the Linux kernel drivers for Intel(R) SGX may allow an authenticated user to potentially enable denial of service via local access.

AI-Powered Analysis

AILast updated: 07/06/2025, 22:28:23 UTC

Technical Analysis

CVE-2021-33135 is a vulnerability identified in the Linux kernel drivers for Intel(R) Software Guard Extensions (SGX). Intel SGX is a set of security-related instruction codes that allow user-level code to allocate private regions of memory, called enclaves, designed to be protected from processes running at higher privilege levels. The vulnerability arises due to uncontrolled resource consumption within these kernel drivers, which can be triggered by an authenticated local user. Specifically, this flaw can lead to a denial of service (DoS) condition by exhausting system resources, thereby impacting the availability of the affected system. The vulnerability is classified under CWE-400, which pertains to uncontrolled resource consumption or resource exhaustion. Exploitation does not require user interaction but does require local authenticated access, meaning an attacker must have some level of legitimate access to the system to trigger the issue. The CVSS v3.1 base score is 5.5, indicating a medium severity level, with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, meaning the attack is local, requires low complexity, low privileges, no user interaction, unchanged scope, no impact on confidentiality or integrity, but high impact on availability. There are no known exploits in the wild at the time of publication, and no specific patches are linked in the provided information, though it is likely that kernel updates addressing this vulnerability exist or will be released. This vulnerability primarily affects systems running Linux kernels with Intel SGX support enabled and accessible to authenticated users.

Potential Impact

For European organizations, the impact of CVE-2021-33135 centers on potential denial of service conditions on systems utilizing Intel SGX technology under Linux. Intel SGX is often employed in environments requiring enhanced security for sensitive computations, including financial services, healthcare, government, and cloud service providers. A successful exploitation could disrupt critical services by exhausting kernel resources, leading to system instability or crashes. This could result in downtime, loss of availability of protected applications, and potential operational disruptions. While confidentiality and integrity are not directly impacted, the availability loss could affect business continuity, especially in sectors relying on enclave-based security for sensitive data processing. Since exploitation requires local authenticated access, the threat is more relevant in environments where multiple users have access to the same systems or where attackers can gain user-level access through other means (e.g., phishing, credential theft). European organizations with multi-tenant environments, shared servers, or those using Intel SGX-enabled Linux systems in production should be particularly vigilant. The absence of known exploits reduces immediate risk but does not eliminate the need for proactive mitigation.

Mitigation Recommendations

To mitigate the risk posed by CVE-2021-33135, European organizations should: 1) Ensure all Linux systems running Intel SGX are updated with the latest kernel patches and security updates from trusted vendors, as kernel-level fixes are the primary remediation. 2) Restrict and monitor local user access to systems with Intel SGX enabled, enforcing the principle of least privilege to minimize the number of users who can trigger the vulnerability. 3) Implement robust user authentication and session management controls to prevent unauthorized local access. 4) Employ system resource monitoring and alerting to detect unusual resource consumption patterns that may indicate exploitation attempts. 5) Consider disabling Intel SGX support on systems where it is not required to reduce the attack surface. 6) Conduct regular security audits and vulnerability assessments focusing on kernel drivers and enclave-related components. 7) Maintain incident response readiness to quickly address potential denial of service incidents affecting critical systems. These steps go beyond generic advice by focusing on access control, monitoring, and minimizing the attack surface specific to Intel SGX on Linux.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2021-05-18T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ec4522896dcbdbb59

Added to database: 5/21/2025, 9:08:46 AM

Last enriched: 7/6/2025, 10:28:23 PM

Last updated: 2/2/2026, 9:06:30 AM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Related Threats

CVE-2026-20422: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8668, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8775, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

Unknown
VulnerabilityMon Feb 02 2026

CVE-2026-20421: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8791

Unknown
VulnerabilityMon Feb 02 2026

CVE-2026-20420: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8676, MT8791

Unknown
VulnerabilityMon Feb 02 2026

CVE-2026-20419: CWE-754 Improper Check for Unusual or Exceptional Conditions in MediaTek, Inc. MT6890, MT6989TB, MT7902, MT7915, MT7916, MT7920, MT7921, MT7922, MT7925, MT7927, MT7981, MT7986, MT8196, MT8668, MT8676, MT8678, MT8775, MT8791T, MT8792, MT8793, MT8796, MT8873, MT8883, MT8893, MT8910

Unknown
VulnerabilityMon Feb 02 2026

CVE-2026-20418: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT7931, MT7933

Unknown
VulnerabilityMon Feb 02 2026

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats