Skip to content

Commit 29cbe18

Browse files
1 parent 1a4a2ef commit 29cbe18

1 file changed

Lines changed: 137 additions & 0 deletions

File tree

Lines changed: 137 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,137 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-796p-j2gh-9m2q",
4+
"modified": "2026-01-26T18:55:13Z",
5+
"published": "2026-01-26T18:55:13Z",
6+
"aliases": [
7+
"CVE-2026-22696"
8+
],
9+
"summary": "dcap-qvl has Missing Verification for QE Identity",
10+
"details": "## Impact\nThis vulnerability involves a critical gap in the cryptographic verification process within the dcap-qvl.\n\nThe library fetches QE Identity collateral (including qe_identity, qe_identity_signature, and qe_identity_issuer_chain) from the PCCS. However, it skips to verify the QE Identity signature against its certificate chain and does not enforce policy constraints on the QE Report.\n\n## Consequences\nAn attacker can forge the QE Identity data to whitelist a malicious or non-Intel Quoting Enclave. This allows the attacker to forge the QE and sign untrusted quotes that the verifier will accept as valid. Effectively, this bypasses the entire remote attestation security model, as the verifier can no longer trust the entity responsible for signing the quotes.\n\n## Who is impacted\nAll deployments utilizing the dcap-qvl library for SGX or TDX quote verification are affected.\n\n## Patches\nThe vulnerability has been patched in dcap-qvl version 0.3.9. The fix implements the missing cryptographic verification for the QE Identity signature and enforces the required checks for MRSIGNER, ISVPRODID, and ISVSVN against the QE Report.\n\nUsers of the `@phala/dcap-qvl-node` and `@phala/dcap-qvl-web` packages should switch to the pure JavaScript implementation, `@phala/dcap-qvl`.\n\n## Workarounds\nThere are no known workarounds for this vulnerability. Users must upgrade to the patched version to ensure that QE Identity collateral is properly verified.\n\n## Credit\nThis bug was reported by Rahul Saxena <saxenism@bluethroatlabs.com>.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "crates.io",
21+
"name": "dcap-qvl"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "0.3.9"
32+
}
33+
]
34+
}
35+
]
36+
},
37+
{
38+
"package": {
39+
"ecosystem": "npm",
40+
"name": "@phala/dcap-qvl"
41+
},
42+
"ranges": [
43+
{
44+
"type": "ECOSYSTEM",
45+
"events": [
46+
{
47+
"introduced": "0"
48+
},
49+
{
50+
"fixed": "0.3.9"
51+
}
52+
]
53+
}
54+
],
55+
"database_specific": {
56+
"last_known_affected_version_range": "<= 0.3.0"
57+
}
58+
},
59+
{
60+
"package": {
61+
"ecosystem": "npm",
62+
"name": "@phala/dcap-qvl-web"
63+
},
64+
"ranges": [
65+
{
66+
"type": "ECOSYSTEM",
67+
"events": [
68+
{
69+
"introduced": "0"
70+
},
71+
{
72+
"last_affected": "0.3.3"
73+
}
74+
]
75+
}
76+
]
77+
},
78+
{
79+
"package": {
80+
"ecosystem": "npm",
81+
"name": "@phala/dcap-qvl-node"
82+
},
83+
"ranges": [
84+
{
85+
"type": "ECOSYSTEM",
86+
"events": [
87+
{
88+
"introduced": "0"
89+
},
90+
{
91+
"last_affected": "0.3.3"
92+
}
93+
]
94+
}
95+
]
96+
},
97+
{
98+
"package": {
99+
"ecosystem": "PyPI",
100+
"name": "dcap-qvl"
101+
},
102+
"ranges": [
103+
{
104+
"type": "ECOSYSTEM",
105+
"events": [
106+
{
107+
"introduced": "0"
108+
},
109+
{
110+
"fixed": "0.3.9"
111+
}
112+
]
113+
}
114+
]
115+
}
116+
],
117+
"references": [
118+
{
119+
"type": "WEB",
120+
"url": "https://github.com/Phala-Network/dcap-qvl/security/advisories/GHSA-796p-j2gh-9m2q"
121+
},
122+
{
123+
"type": "PACKAGE",
124+
"url": "https://github.com/Phala-Network/dcap-qvl"
125+
}
126+
],
127+
"database_specific": {
128+
"cwe_ids": [
129+
"CWE-295",
130+
"CWE-347"
131+
],
132+
"severity": "CRITICAL",
133+
"github_reviewed": true,
134+
"github_reviewed_at": "2026-01-26T18:55:13Z",
135+
"nvd_published_at": null
136+
}
137+
}

0 commit comments

Comments
 (0)