CVE-2021-36219

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-36219
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-36219.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-36219
Published
2021-09-27T14:15:08.537Z
Modified
2025-11-14T12:05:16.800358Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An issue was discovered in SKALE sgxwallet 1.58.3. The provided input for ECALL 14 triggers a branch in trustedEcdsaSign that frees a non-initialized pointer from the stack. An attacker can chain multiple enclave calls to prepare a stack that contains a valid address. This address is then freed, resulting in compromised integrity of the enclave. This was resolved after v1.58.3 and not reproducible in sgxwallet v1.77.0.

References

Affected packages

Git / github.com/skalenetwork/sgxwallet

Affected ranges

Type
GIT
Repo
https://github.com/skalenetwork/sgxwallet
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

Other

build_base
build_base1
build_base1_48_11
build_base2
build_base20
build_base21
build_base22
build_base_1_28_20
build_base_1_48
build_base_1_48_12
build_base_1_48_13
build_base_1_48_14
build_base_1_48_17
build_base_1_48_18
build_base_1_48_19
build_base_1_48_20
build_base_1_48_21
build_base_1_48_22
build_base_1_48_23
build_base_1_48_3
build_base_1_48_4
build_base_1_48_5
build_base_1_48_6
build_base_1_48_7
build_base_1_48_8
build_base_1_49_2

sgxwalletsim.*

sgxwalletsim.1.49-develop.4