{"api_version":"1","generated_at":"2026-04-23T02:36:24+00:00","cve":"CVE-2021-22548","urls":{"html":"https://cve.report/CVE-2021-22548","api":"https://cve.report/api/cve/CVE-2021-22548.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-22548","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-22548"},"summary":{"title":"CVE-2021-22548","description":"An attacker can change the pointer to untrusted memory to point to trusted memory region which causes copying trusted memory to trusted memory, if the latter is later copied out, it allows for reading of memory regions from the trusted region. It is recommended to update past 0.6.2 or git commit https://github.com/google/asylo/commit/53ed5d8fd8118ced1466e509606dd2f473707a5c","state":"PUBLIC","assigner":"security@google.com","published_at":"2021-06-08 14:15:00","updated_at":"2021-06-17 16:09:00"},"problem_types":["NVD-CWE-Other"],"metrics":[],"references":[{"url":"https://github.com/google/asylo/commit/53ed5d8fd8118ced1466e509606dd2f473707a5c","name":"https://github.com/google/asylo/commit/53ed5d8fd8118ced1466e509606dd2f473707a5c","refsource":"MISC","tags":[],"title":"Store untrusted output pointer in enclave · google/asylo@53ed5d8 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-22548","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22548","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Qinkun Bao (Baidu Security)","lang":""},{"source":"LEGACY","value":"Zhaofeng Chen (Baidu Security)","lang":""},{"source":"LEGACY","value":"Mingshen Sun (Baidu Security)","lang":""},{"source":"LEGACY","value":"Kang Li (Baidu Security)","lang":""}],"nvd_cpes":[{"cve_year":"2021","cve_id":"22548","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"google","cpe5":"asylo","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security@google.com","DATE_PUBLIC":"2021-03-29T10:00:00.000Z","ID":"CVE-2021-22548","STATE":"PUBLIC","TITLE":"Arbitrary enclave memory overread vulnerability in Asylo TrustedPrimitives::UntrustedCall"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Asylo","version":{"version_data":[{"version_affected":"<=","version_value":"0.6.2"}]}}]},"vendor_name":"Google LLC"}]}},"credit":[{"lang":"eng","value":"Qinkun Bao (Baidu Security)"},{"lang":"eng","value":"Zhaofeng Chen (Baidu Security)"},{"lang":"eng","value":"Mingshen Sun (Baidu Security)"},{"lang":"eng","value":"Kang Li (Baidu Security)"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An attacker can change the pointer to untrusted memory to point to trusted memory region which causes copying trusted memory to trusted memory, if the latter is later copied out, it allows for reading of memory regions from the trusted region. It is recommended to update past 0.6.2 or git commit https://github.com/google/asylo/commit/53ed5d8fd8118ced1466e509606dd2f473707a5c"}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"HIGH","attackVector":"LOCAL","availabilityImpact":"LOW","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-788 Access of Memory Location After End of Buffer"}]}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://github.com/google/asylo/commit/53ed5d8fd8118ced1466e509606dd2f473707a5c","name":"https://github.com/google/asylo/commit/53ed5d8fd8118ced1466e509606dd2f473707a5c"}]},"source":{"discovery":"EXTERNAL"}},"nvd":{"publishedDate":"2021-06-08 14:15:00","lastModifiedDate":"2021-06-17 16:09:00","problem_types":["NVD-CWE-Other"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":4.6},"severity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:google:asylo:*:*:*:*:*:*:*:*","versionEndExcluding":"0.6.2","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"22548","Ordinal":"197253","Title":"CVE-2021-22548","CVE":"CVE-2021-22548","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"22548","Ordinal":"1","NoteData":"An attacker can change the pointer to untrusted memory to point to trusted memory region which causes copying trusted memory to trusted memory, if the latter is later copied out, it allows for reading of memory regions from the trusted region. It is recommended to update past 0.6.2 or git commit https://github.com/google/asylo/commit/53ed5d8fd8118ced1466e509606dd2f473707a5c","Type":"Description","Title":null},{"CveYear":"2021","CveId":"22548","Ordinal":"2","NoteData":"2021-06-08","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"22548","Ordinal":"3","NoteData":"2021-06-08","Type":"Other","Title":"Modified"}]}}}