Description
dcap-qvl implements the quote verification logic for DCAP (Data Center Attestation Primitives). A vulnerability present in versions prior to 0.3.9 involves a critical gap in the cryptographic verification process within the dcap-qvl. The library fetches QE Identity collateral (including qe_identity, qe_identity_signature, and qe_identity_issuer_chain) from the PCCS. However, it skips to verify the QE Identity signature against its certificate chain and does not enforce policy constraints on the QE Report. An attacker can forge the QE Identity data to whitelist a malicious or non-Intel Quoting Enclave. This allows the attacker to forge the QE and sign untrusted quotes that the verifier will accept as valid. Effectively, this bypasses the entire remote attestation security model, as the verifier can no longer trust the entity responsible for signing the quotes. All deployments utilizing the dcap-qvl library for SGX or TDX quote verification are affected. The vulnerability has been patched in dcap-qvl version 0.3.9. The fix implements the missing cryptographic verification for the QE Identity signature and enforces the required checks for MRSIGNER, ISVPRODID, and ISVSVN against the QE Report. Users of the `@phala/dcap-qvl-node` and `@phala/dcap-qvl-web` packages should switch to the pure JavaScript implementation, `@phala/dcap-qvl`. There are no known workarounds for this vulnerability. Users must upgrade to the patched version to ensure that QE Identity collateral is properly verified.
Published: 2026-01-26
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized quote forgery (remote attestation bypass)
Action: Immediate patch
AI Analysis

Impact

The dcap-qvl library contains a critical gap in cryptographic verification: it retrieves QE Identity collateral from the PCCS but does not verify the signature against its certificate chain or enforce policy constraints on the QE Report. An attacker can forge this data to allow a malicious or non‑Intel Quoting Enclave to be trusted, enabling the generation of counterfeit signed quotes that the verifier will accept. This effectively defeats the remote attestation security model, permitting the attacker to present illegitimate enclaves as valid, which could lead to unauthorized access or execution of privileged code within systems that rely on SGX or TDX attestation.

Affected Systems

All deployments that use Phala Network’s dcap-qvl library for SGX or TDX quote verification are vulnerable, specifically versions prior to 0.3.9. The packages @phala/dcap-qvl-node and @phala/dcap-qvl-web, which use the non‑pure‑JavaScript implementation, are also affected. These systems include any application that imports dcap-qvl to validate enclave quotes and relies on the default identity verification logic.

Risk and Exploitability

The CVSS score of 9.3 indicates critical severity, but the EPSS score of less than 1% suggests a very low likelihood of exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires an attacker to supply forged QE Identity data to a system that processes quotes through dcap-qvl; once in place, the attacker can generate trusted‑looking quotes that bypass attestation checks. Because no workarounds exist and the flaw allows bypass of fundamental attestation guarantees, the risk remains high for affected systems.

Generated by OpenCVE AI on April 18, 2026 at 02:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade dcap-qvl to version 0.3.9 or later to restore cryptographic verification and policy enforcement.
  • Replace the @phala/dcap-qvl-node and @phala/dcap-qvl-web packages with the pure JavaScript implementation @phala/dcap-qvl.
  • Verify that your integration performs strict validation of the QE Identity signature and enforces MRSIGNER, ISVPRODID, and ISVSVN constraints after applying the patch.

Generated by OpenCVE AI on April 18, 2026 at 02:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-796p-j2gh-9m2q dcap-qvl has Missing Verification for QE Identity
History

Tue, 27 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 27 Jan 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Phala-network
Phala-network dcap-qvl
Vendors & Products Phala-network
Phala-network dcap-qvl

Mon, 26 Jan 2026 21:45:00 +0000

Type Values Removed Values Added
Description dcap-qvl implements the quote verification logic for DCAP (Data Center Attestation Primitives). A vulnerability present in versions prior to 0.3.9 involves a critical gap in the cryptographic verification process within the dcap-qvl. The library fetches QE Identity collateral (including qe_identity, qe_identity_signature, and qe_identity_issuer_chain) from the PCCS. However, it skips to verify the QE Identity signature against its certificate chain and does not enforce policy constraints on the QE Report. An attacker can forge the QE Identity data to whitelist a malicious or non-Intel Quoting Enclave. This allows the attacker to forge the QE and sign untrusted quotes that the verifier will accept as valid. Effectively, this bypasses the entire remote attestation security model, as the verifier can no longer trust the entity responsible for signing the quotes. All deployments utilizing the dcap-qvl library for SGX or TDX quote verification are affected. The vulnerability has been patched in dcap-qvl version 0.3.9. The fix implements the missing cryptographic verification for the QE Identity signature and enforces the required checks for MRSIGNER, ISVPRODID, and ISVSVN against the QE Report. Users of the `@phala/dcap-qvl-node` and `@phala/dcap-qvl-web` packages should switch to the pure JavaScript implementation, `@phala/dcap-qvl`. There are no known workarounds for this vulnerability. Users must upgrade to the patched version to ensure that QE Identity collateral is properly verified.
Title dcap-qvl has Missing Verification for QE Identity
Weaknesses CWE-295
CWE-347
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Phala-network Dcap-qvl
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-27T21:43:00.366Z

Reserved: 2026-01-08T19:23:09.856Z

Link: CVE-2026-22696

cve-icon Vulnrichment

Updated: 2026-01-27T21:42:56.943Z

cve-icon NVD

Status : Deferred

Published: 2026-01-26T22:15:55.733

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-22696

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T02:45:27Z

Weaknesses