Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-25371: n/a

0
High
VulnerabilityCVE-2024-25371cvecve-2024-25371
Published: Fri Jan 10 2025 (01/10/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Gramine before a390e33e16ed374a40de2344562a937f289be2e1 suffers from an Interface vulnerability due to mismatching SW signals vs HW exceptions.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 10:35:58 UTC

Technical Analysis

CVE-2024-25371 is a vulnerability identified in the Gramine project, an open-source library OS designed to run unmodified Linux applications in trusted execution environments (TEEs) such as Intel SGX. The issue stems from an interface vulnerability caused by mismatches between software signals and hardware exceptions. Specifically, the software's handling of signals does not correctly align with the hardware exceptions generated, leading to inconsistent or improper exception processing. This can cause the affected application or environment to crash or become unavailable, effectively resulting in a denial-of-service (DoS) condition. The vulnerability is remotely exploitable over the network without requiring any privileges or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component itself. The CVSS base score of 7.5 reflects a high severity primarily due to the complete loss of availability (A:H) while confidentiality and integrity remain unaffected. No patches or exploit code are currently publicly available, but the vulnerability has been officially published and reserved since early 2024. Gramine is used in cloud and edge computing environments to secure applications via TEEs, so this vulnerability could disrupt critical secure workloads if exploited.

Potential Impact

The primary impact of CVE-2024-25371 is a denial-of-service condition that can disrupt availability of applications running within Gramine-based trusted execution environments. Organizations relying on Gramine to secure sensitive workloads in cloud or edge environments may experience service outages or application crashes, potentially affecting business continuity and operational reliability. Since the vulnerability does not affect confidentiality or integrity, data breaches or unauthorized data modifications are not expected. However, the loss of availability in security-critical environments could undermine trust in protected applications and delay critical processing tasks. The ease of remote exploitation without authentication increases the risk of widespread attacks, especially in environments where Gramine is exposed to untrusted networks. Although no known exploits exist yet, the vulnerability's presence in a niche but growing technology stack means targeted attackers could develop exploits to disrupt secure enclaves or cloud services. This could have cascading effects on organizations using Gramine for confidential computing, including cloud service providers, financial institutions, and government agencies.

Mitigation Recommendations

To mitigate CVE-2024-25371, organizations should first monitor official Gramine project channels for patches or updates addressing the interface mismatch. Until a patch is available, deploying network-level protections such as firewalls and intrusion prevention systems to restrict access to Gramine-exposed services can reduce exposure. Implementing strict network segmentation to isolate trusted execution environments from untrusted networks is recommended. Additionally, monitoring application and system logs for abnormal signal handling or unexpected process terminations can provide early warning of exploitation attempts. Where feasible, consider deploying fallback or redundancy mechanisms to maintain availability if Gramine-based applications crash. Security teams should also conduct thorough testing of Gramine deployments to identify any custom configurations that might exacerbate the vulnerability. Finally, coordinate with cloud providers or vendors using Gramine to ensure timely updates and shared threat intelligence.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-02-07T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d65b7ef31ef0b571d3e

Added to database: 2/25/2026, 9:45:09 PM

Last enriched: 2/26/2026, 10:35:58 AM

Last updated: 4/12/2026, 5:08:31 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses