CVE-2026-33697: CWE-322: Key Exchange without Entity Authentication in ultravioletrs cocos
CVE-2026-33697 is a high-severity vulnerability in the attested TLS (aTLS) implementation of CoCoS, a confidential computing system for AI, affecting versions 0. 4. 0 through 0. 8. 2. The vulnerability allows a relay attack due to key exchange without proper entity authentication, enabling attackers who extract the ephemeral TLS private key to impersonate attested services. Exploitation requires physical access or advanced side-channel or transient execution attacks to obtain the ephemeral key. The attestation evidence is bound to the ephemeral key but not the TLS channel, allowing attackers to relay or divert sessions undetected. This architectural weakness undermines the authentication guarantees of aTLS, potentially exposing sensitive AI workloads and data. No patch or complete workaround currently exists, though firmware updates, strict attestation policies, and mutual aTLS with CA-signed certificates can reduce risk.
AI Analysis
Technical Summary
CVE-2026-33697 identifies a critical architectural vulnerability in the attested TLS (aTLS) implementation within the CoCoS confidential computing system for AI workloads. CoCoS supports deployment on AMD SEV-SNP and Intel TDX trusted execution environments (TEEs). The vulnerability arises because the ephemeral TLS private key used during the intra-handshake attestation can be extracted by attackers through physical access, transient execution attacks, or side-channel attacks. The attestation evidence is cryptographically bound to this ephemeral key but not to the TLS channel itself, meaning possession of the ephemeral key allows an attacker to relay or divert the attested TLS session. Consequently, clients cannot distinguish between genuine attested services and attacker-relayed connections, breaking the entity authentication guarantees of aTLS. This flaw enables attackers to impersonate attested CoCoS services and access data or operations intended only for the genuine endpoint. The vulnerability affects all CoCoS versions from 0.4.0 to 0.8.2, including the redesigned aTLS implementation introduced in v0.7.0, as the weakness is architectural rather than implementation-specific. The issue was formally analyzed and demonstrated across multiple attested TLS implementations, with formal verification using ProVerif. No patch or complete workaround is currently available. Mitigation strategies include keeping TEE firmware and microcode updated to reduce key-extraction attack surfaces, enforcing strict attestation policies validating all report fields (firmware versions, TCB levels, platform configuration registers), and enabling mutual aTLS with CA-signed certificates where feasible. The CVSS v3.1 score is 7.5 (high), reflecting local attack vector, high complexity, low privileges required, no user interaction, and high confidentiality and integrity impact with no availability impact.
Potential Impact
The vulnerability poses a significant risk to organizations deploying CoCoS for confidential AI computing, particularly those relying on attested TLS to ensure endpoint authenticity and secure intra-handshake attestation. Successful exploitation allows attackers to impersonate attested services, potentially gaining unauthorized access to sensitive AI model data, inference results, or control operations intended only for trusted endpoints. This undermines the confidentiality and integrity of AI workloads running within TEEs on AMD SEV-SNP and Intel TDX platforms. The attack requires advanced capabilities such as physical access or sophisticated side-channel or transient execution attacks, limiting broad exploitation but posing a severe threat in high-value environments. The inability to distinguish genuine from relayed attested TLS sessions compromises trust in the attestation mechanism, potentially leading to data breaches, intellectual property theft, or manipulation of AI computations. The lack of a patch or complete workaround increases exposure duration. Organizations with critical AI workloads in confidential computing environments face operational and reputational risks if exploited.
Mitigation Recommendations
Given the absence of a patch, organizations must adopt layered mitigations to reduce risk. First, ensure all TEE firmware and microcode are up to date to minimize vulnerabilities enabling ephemeral key extraction. Second, implement strict attestation policies that validate all attestation report fields, including firmware versions, Trusted Computing Base (TCB) levels, and platform configuration registers, to detect anomalies or unauthorized changes. Third, where deployment architecture permits, enable mutual attested TLS with CA-signed certificates to strengthen endpoint authentication beyond ephemeral key binding. Fourth, restrict physical access to servers hosting CoCoS to prevent direct key extraction attacks. Fifth, monitor for signs of side-channel or transient execution attacks and apply relevant hardware and software mitigations. Finally, maintain close coordination with the CoCoS vendor and ultravioletrs project for updates or patches and plan for rapid deployment once available. Consider isolating or limiting sensitive AI workloads until the vulnerability is remediated.
Affected Countries
United States, China, Germany, South Korea, Japan, United Kingdom, France, Canada, Israel, Singapore
CVE-2026-33697: CWE-322: Key Exchange without Entity Authentication in ultravioletrs cocos
Description
CVE-2026-33697 is a high-severity vulnerability in the attested TLS (aTLS) implementation of CoCoS, a confidential computing system for AI, affecting versions 0. 4. 0 through 0. 8. 2. The vulnerability allows a relay attack due to key exchange without proper entity authentication, enabling attackers who extract the ephemeral TLS private key to impersonate attested services. Exploitation requires physical access or advanced side-channel or transient execution attacks to obtain the ephemeral key. The attestation evidence is bound to the ephemeral key but not the TLS channel, allowing attackers to relay or divert sessions undetected. This architectural weakness undermines the authentication guarantees of aTLS, potentially exposing sensitive AI workloads and data. No patch or complete workaround currently exists, though firmware updates, strict attestation policies, and mutual aTLS with CA-signed certificates can reduce risk.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-33697 identifies a critical architectural vulnerability in the attested TLS (aTLS) implementation within the CoCoS confidential computing system for AI workloads. CoCoS supports deployment on AMD SEV-SNP and Intel TDX trusted execution environments (TEEs). The vulnerability arises because the ephemeral TLS private key used during the intra-handshake attestation can be extracted by attackers through physical access, transient execution attacks, or side-channel attacks. The attestation evidence is cryptographically bound to this ephemeral key but not to the TLS channel itself, meaning possession of the ephemeral key allows an attacker to relay or divert the attested TLS session. Consequently, clients cannot distinguish between genuine attested services and attacker-relayed connections, breaking the entity authentication guarantees of aTLS. This flaw enables attackers to impersonate attested CoCoS services and access data or operations intended only for the genuine endpoint. The vulnerability affects all CoCoS versions from 0.4.0 to 0.8.2, including the redesigned aTLS implementation introduced in v0.7.0, as the weakness is architectural rather than implementation-specific. The issue was formally analyzed and demonstrated across multiple attested TLS implementations, with formal verification using ProVerif. No patch or complete workaround is currently available. Mitigation strategies include keeping TEE firmware and microcode updated to reduce key-extraction attack surfaces, enforcing strict attestation policies validating all report fields (firmware versions, TCB levels, platform configuration registers), and enabling mutual aTLS with CA-signed certificates where feasible. The CVSS v3.1 score is 7.5 (high), reflecting local attack vector, high complexity, low privileges required, no user interaction, and high confidentiality and integrity impact with no availability impact.
Potential Impact
The vulnerability poses a significant risk to organizations deploying CoCoS for confidential AI computing, particularly those relying on attested TLS to ensure endpoint authenticity and secure intra-handshake attestation. Successful exploitation allows attackers to impersonate attested services, potentially gaining unauthorized access to sensitive AI model data, inference results, or control operations intended only for trusted endpoints. This undermines the confidentiality and integrity of AI workloads running within TEEs on AMD SEV-SNP and Intel TDX platforms. The attack requires advanced capabilities such as physical access or sophisticated side-channel or transient execution attacks, limiting broad exploitation but posing a severe threat in high-value environments. The inability to distinguish genuine from relayed attested TLS sessions compromises trust in the attestation mechanism, potentially leading to data breaches, intellectual property theft, or manipulation of AI computations. The lack of a patch or complete workaround increases exposure duration. Organizations with critical AI workloads in confidential computing environments face operational and reputational risks if exploited.
Mitigation Recommendations
Given the absence of a patch, organizations must adopt layered mitigations to reduce risk. First, ensure all TEE firmware and microcode are up to date to minimize vulnerabilities enabling ephemeral key extraction. Second, implement strict attestation policies that validate all attestation report fields, including firmware versions, Trusted Computing Base (TCB) levels, and platform configuration registers, to detect anomalies or unauthorized changes. Third, where deployment architecture permits, enable mutual attested TLS with CA-signed certificates to strengthen endpoint authentication beyond ephemeral key binding. Fourth, restrict physical access to servers hosting CoCoS to prevent direct key extraction attacks. Fifth, monitor for signs of side-channel or transient execution attacks and apply relevant hardware and software mitigations. Finally, maintain close coordination with the CoCoS vendor and ultravioletrs project for updates or patches and plan for rapid deployment once available. Consider isolating or limiting sensitive AI workloads until the vulnerability is remediated.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-23T17:06:05.745Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c5c8713c064ed76fe63c63
Added to database: 3/26/2026, 11:59:45 PM
Last enriched: 3/27/2026, 12:15:03 AM
Last updated: 3/27/2026, 2:03:47 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.