Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33697: CWE-322: Key Exchange without Entity Authentication in ultravioletrs cocos

0
High
VulnerabilityCVE-2026-33697cvecve-2026-33697cwe-322cwe-346
Published: Thu Mar 26 2026 (03/26/2026, 23:34:53 UTC)
Source: CVE Database V5
Vendor/Project: ultravioletrs
Product: cocos

Description

CVE-2026-33697 is a high-severity vulnerability in the attested TLS (aTLS) implementation of CoCoS, a confidential computing system for AI, affecting versions 0. 4. 0 through 0. 8. 2. The vulnerability allows a relay attack due to key exchange without proper entity authentication, enabling attackers who extract the ephemeral TLS private key to impersonate attested services. Exploitation requires physical access or advanced side-channel or transient execution attacks to obtain the ephemeral key. The attestation evidence is bound to the ephemeral key but not the TLS channel, allowing attackers to relay or divert sessions undetected. This architectural weakness undermines the authentication guarantees of aTLS, potentially exposing sensitive AI workloads and data. No patch or complete workaround currently exists, though firmware updates, strict attestation policies, and mutual aTLS with CA-signed certificates can reduce risk.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 00:15:03 UTC

Technical Analysis

CVE-2026-33697 identifies a critical architectural vulnerability in the attested TLS (aTLS) implementation within the CoCoS confidential computing system for AI workloads. CoCoS supports deployment on AMD SEV-SNP and Intel TDX trusted execution environments (TEEs). The vulnerability arises because the ephemeral TLS private key used during the intra-handshake attestation can be extracted by attackers through physical access, transient execution attacks, or side-channel attacks. The attestation evidence is cryptographically bound to this ephemeral key but not to the TLS channel itself, meaning possession of the ephemeral key allows an attacker to relay or divert the attested TLS session. Consequently, clients cannot distinguish between genuine attested services and attacker-relayed connections, breaking the entity authentication guarantees of aTLS. This flaw enables attackers to impersonate attested CoCoS services and access data or operations intended only for the genuine endpoint. The vulnerability affects all CoCoS versions from 0.4.0 to 0.8.2, including the redesigned aTLS implementation introduced in v0.7.0, as the weakness is architectural rather than implementation-specific. The issue was formally analyzed and demonstrated across multiple attested TLS implementations, with formal verification using ProVerif. No patch or complete workaround is currently available. Mitigation strategies include keeping TEE firmware and microcode updated to reduce key-extraction attack surfaces, enforcing strict attestation policies validating all report fields (firmware versions, TCB levels, platform configuration registers), and enabling mutual aTLS with CA-signed certificates where feasible. The CVSS v3.1 score is 7.5 (high), reflecting local attack vector, high complexity, low privileges required, no user interaction, and high confidentiality and integrity impact with no availability impact.

Potential Impact

The vulnerability poses a significant risk to organizations deploying CoCoS for confidential AI computing, particularly those relying on attested TLS to ensure endpoint authenticity and secure intra-handshake attestation. Successful exploitation allows attackers to impersonate attested services, potentially gaining unauthorized access to sensitive AI model data, inference results, or control operations intended only for trusted endpoints. This undermines the confidentiality and integrity of AI workloads running within TEEs on AMD SEV-SNP and Intel TDX platforms. The attack requires advanced capabilities such as physical access or sophisticated side-channel or transient execution attacks, limiting broad exploitation but posing a severe threat in high-value environments. The inability to distinguish genuine from relayed attested TLS sessions compromises trust in the attestation mechanism, potentially leading to data breaches, intellectual property theft, or manipulation of AI computations. The lack of a patch or complete workaround increases exposure duration. Organizations with critical AI workloads in confidential computing environments face operational and reputational risks if exploited.

Mitigation Recommendations

Given the absence of a patch, organizations must adopt layered mitigations to reduce risk. First, ensure all TEE firmware and microcode are up to date to minimize vulnerabilities enabling ephemeral key extraction. Second, implement strict attestation policies that validate all attestation report fields, including firmware versions, Trusted Computing Base (TCB) levels, and platform configuration registers, to detect anomalies or unauthorized changes. Third, where deployment architecture permits, enable mutual attested TLS with CA-signed certificates to strengthen endpoint authentication beyond ephemeral key binding. Fourth, restrict physical access to servers hosting CoCoS to prevent direct key extraction attacks. Fifth, monitor for signs of side-channel or transient execution attacks and apply relevant hardware and software mitigations. Finally, maintain close coordination with the CoCoS vendor and ultravioletrs project for updates or patches and plan for rapid deployment once available. Consider isolating or limiting sensitive AI workloads until the vulnerability is remediated.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-23T17:06:05.745Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c5c8713c064ed76fe63c63

Added to database: 3/26/2026, 11:59:45 PM

Last enriched: 3/27/2026, 12:15:03 AM

Last updated: 3/27/2026, 2:03:47 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses