Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-29970: n/a

0
Critical
VulnerabilityCVE-2024-29970cvecve-2024-29970
Published: Fri Jan 10 2025 (01/10/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Fortanix Enclave OS 3.36.1941-EM has an interface vulnerability that leads to state corruption via injected signals.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 16:42:11 UTC

Technical Analysis

CVE-2024-29970 is a critical interface vulnerability identified in Fortanix Enclave OS version 3.36.1941-EM. The flaw arises from improper handling of injected signals, which leads to state corruption within the enclave operating system. Enclave OS is designed to provide hardware-based trusted execution environments, isolating sensitive computations and data. The vulnerability allows an unauthenticated, remote attacker to send crafted signals that corrupt the internal state of the OS, potentially enabling arbitrary code execution, privilege escalation, or denial of service. The CVSS v3.1 base score of 9.8 indicates that the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and affects confidentiality, integrity, and availability (C:H/I:H/A:H). The scope is unchanged (S:U), meaning the impact is confined to the vulnerable component but is nonetheless severe. No patches or mitigations were listed at the time of publication, and no known exploits have been observed in the wild. Given the critical role of Fortanix Enclave OS in securing sensitive workloads, exploitation could undermine the trustworthiness of protected data and operations.

Potential Impact

The vulnerability poses a severe risk to organizations using Fortanix Enclave OS, especially those relying on secure enclaves for protecting cryptographic keys, sensitive data, or critical application logic. Successful exploitation could lead to full compromise of enclave confidentiality and integrity, allowing attackers to extract secrets or manipulate protected computations. The availability of the enclave OS could also be disrupted, causing denial of service. This could have cascading effects on cloud service providers, financial institutions, healthcare organizations, and government agencies that depend on hardware-based security for compliance and data protection. The lack of required privileges or user interaction lowers the barrier for attackers, increasing the likelihood of exploitation once an exploit becomes available. The absence of known exploits currently provides a window for proactive mitigation, but the critical severity demands urgent attention.

Mitigation Recommendations

Organizations should immediately inventory their use of Fortanix Enclave OS to identify affected versions, specifically 3.36.1941-EM. Until a vendor patch is released, consider implementing network-level protections such as strict firewall rules to limit access to enclave management interfaces and isolate vulnerable systems. Employ runtime monitoring and anomaly detection focused on unusual signal injection patterns or unexpected enclave state changes. Engage with Fortanix support to obtain any available workarounds or early patches. Plan for rapid deployment of official patches once released. Additionally, review enclave configuration to minimize exposed interfaces and apply the principle of least privilege to all enclave-related processes. Conduct thorough incident response preparedness to quickly detect and respond to any exploitation attempts. Finally, maintain up-to-date backups and recovery plans to mitigate potential denial-of-service impacts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-22T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6da2b7ef31ef0b5899d4

Added to database: 2/25/2026, 9:46:10 PM

Last enriched: 2/26/2026, 4:42:11 PM

Last updated: 4/12/2026, 5:07:16 PM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses