Impact
The vulnerability in CoCoS’s attested TLS allows a threat actor to extract the transient private key used in the TLS handshake. Possession of this key lets the attacker relay or redirect the TLS session, causing a client to believe it is communicating with the intended attested service when it is in fact a malicious relay. This breaks the authentication guarantees of attested TLS, enabling the adversary to impersonate the service, access confidential data, or execute unauthorized operations. The weakness is architectural and is unrelated to a specific software bug, relying on the design of the attestation process.
Affected Systems
The issue affects the CoCoS AI confidential computing system provided by ultravioletrs for all releases from version 0.4.0 through 0.8.2, including deployments on both AMD SEV‑SNP and Intel TDX platforms. No patch is currently available for this range of versions.
Risk and Exploitability
The CVSS score of 7.5 indicates a high severity, while the EPSS score is not published. The vulnerability is not listed in the CISA KEV catalog. Exploitability requires the attacker to first obtain the transient TLS private key, which can be achieved through physical access to the server hardware, transient execution attacks, or side‑channel attacks. Given the architectural nature of the flaw and the lack of a public patch, the risk is significant for any system that relies on CoCoS attested TLS for secure client‑server communication.
OpenCVE Enrichment