<p><span style="font-weight: 400;">The developers of Layer 1 blockchain Secret Network said they resolved a security issue flagged by researchers who highlighted a vulnerability posed by Intel hardware the network used</span><span style="font-weight: 400;"> to enable privacy-preserving smart contracts. </span></p> <p><span style="font-weight: 400;">Secret’s promised privacy apps may have been compromised due to a vulnerability in <a href="https://wccftech.com/aepic-leak-is-an-architectural-cpu-bug-affecting-10th-11th-and-12th-gen-intel-core-cpus/">certain Intel SGX chips</a> called</span><a href="https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/stale-data-read-from-xapic.html"><span style="font-weight: 400;"> xAPIC</span></a><span style="font-weight: 400;"> or</span><a href="https://aepicleak.com/aepicleak.pdf"><span style="font-weight: 400;"> ÆPIC Leak</span></a><span style="font-weight: 400;">. </span></p> <p><span style="font-weight: 400;">Intel SGX chips are commonly used by software firms for privacy computing. </span><span style="font-weight: 400;">Secret’s blockchain nodes also use them to encrypt data in a software setup called a “trusted execution environment(TEE).”</span> <span style="font-weight: 400;">However, the presence of xAPIC vulnerability also meant hackers could potentially snoop on systems depending on SGX. To prove the risk faced by Secret, the researchers <a href="https://sgx.fail/files/sgx.fail.pdf">extracted</a> a “consensus seed” to decrypt all private transactions on the Secret blockchain. </span></p> <p><span style="font-weight: 400;">“We evaluated TEE-based blockchain Secret Network to see if it was susceptible to ÆPICLeak, and ended up finding the master decryption key for the whole network,”</span> <a href="https://twitter.com/socrates1024/status/1597637285058863104?s=46&amp;t=EJuPr-UMugDvTRIe6YGHcw"><span style="font-weight: 400;">said</span></a><span style="font-weight: 400;"> Andrew Miller, a lead researcher of the report and Assistant Professor at the University of Illinois, Urbana-Champaign.</span></p> <p><span style="font-weight: 400;">The researchers showed that it was possible that a malicious hacker could have also obtained all the transactional history on the network, contrary to Secret’s promise of full privacy. </span></p> <h2>No funds at risk</h2> <p><span style="font-weight: 400;">In a</span> <a href="https://scrt.network/blog/notice-successful-resolution-of-xapic-vulnerability"><span style="font-weight: 400;">blog post</span></a><span style="font-weight: 400;">, SCRT Labs, the developer of Secret Network, claimed that no such incident related to a privacy leak had taken place, to the best of its knowledge — </span><span style="font-weight: 400;">adding the hardware vulnerability only affected the privacy of data stored on Secret Network not used to determine the consensus of the blockchain. </span></p> <p><span style="font-weight: 400;">“Most importantly, funds were never at risk, because Secret intentionally does not rely on SGX for correctness – only privacy,” Guy Zyskind, CEO at SCRT Labs</span> <a href="https://twitter.com/GuyZys/status/1597725974611001344"><span style="font-weight: 400;">said</span></a><span style="font-weight: 400;">.</span></p> <p><span style="font-weight: 400;">The researchers first notified SCRT Labs of the vulnerability on Oct. 3. SCRT Labs acted to freeze new nodes to connect to the network to limit the exposure of the vulnerability. </span></p> <p><span style="font-weight: 400;">Later, the blockchain firm worked with Intel to develop a patch to prevent vulnerable machines from connecting to the network. This solution was deployed on Nov. 2 via a network upgrade and now the network is secure, it said. </span><span style="font-weight: 400;">“With this upgrade, it is now infeasible to mount xAPIC attacks against the Secret Network mainnet,” SCRT Labs claimed. </span></p> <p><span style="font-weight: 400;">SCRT Labs said that it delayed the disclosure of the vulnerability </span><span style="font-weight: 400;">to prevent any malicious hacker from exploiting the vulnerability while it worked on the patch. </span></p><br /><span class="copyright"><p>© 2023 The Block Crypto, Inc. All Rights Reserved. This article is provided for informational purposes only. It is not offered or intended to be used as legal, tax, investment, financial, or other advice.</p> </span>