TEE.Fail attack exploits Intel, AMD, and NVIDIA CPUs
Summary
Hide ▲
Show ▼
Academic researchers have developed a side-channel attack called TEE.Fail, which can extract secrets from the trusted execution environment (TEE) in Intel, AMD, and NVIDIA CPUs. The attack targets DDR5 systems and exploits weaknesses in modern implementations of Intel SGX, Intel TDX, and AMD SEV-SNP. The TEE is a highly secure area within the CPU designed to ensure the confidentiality and integrity of sensitive data. The attack requires physical access and root-level privileges, but no chip-level expertise. Researchers demonstrated the ability to forge attestations, extract private keys, and breach confidentiality. The attack is complex and less practical for average users but highlights significant vulnerabilities in confidential computing. The researchers reported their findings to Intel, AMD, and NVIDIA, who acknowledged the issues and are working on mitigations.
Timeline
-
28.10.2025 19:00 1 articles · 13d ago
TEE.Fail attack demonstrated on Intel, AMD, and NVIDIA CPUs
Researchers from Georgia Tech and Purdue University developed TEE.Fail, a side-channel attack that extracts secrets from TEEs in Intel, AMD, and NVIDIA CPUs. The attack targets DDR5 systems and exploits weaknesses in modern implementations of Intel SGX, Intel TDX, and AMD SEV-SNP. The researchers demonstrated key extraction, attestation forgery, and confidentiality breaches. Intel, AMD, and NVIDIA acknowledged the issues and are working on mitigations.
Show sources
- TEE.Fail attack breaks confidential computing on Intel, AMD, NVIDIA CPUs — www.bleepingcomputer.com — 28.10.2025 19:00
Information Snippets
-
TEE.Fail is a side-channel attack targeting DDR5 systems.
First reported: 28.10.2025 19:001 source, 1 articleShow sources
- TEE.Fail attack breaks confidential computing on Intel, AMD, NVIDIA CPUs — www.bleepingcomputer.com — 28.10.2025 19:00
-
The attack exploits weaknesses in Intel SGX, Intel TDX, and AMD SEV-SNP.
First reported: 28.10.2025 19:001 source, 1 articleShow sources
- TEE.Fail attack breaks confidential computing on Intel, AMD, NVIDIA CPUs — www.bleepingcomputer.com — 28.10.2025 19:00
-
The attack requires physical access and root-level privileges.
First reported: 28.10.2025 19:001 source, 1 articleShow sources
- TEE.Fail attack breaks confidential computing on Intel, AMD, NVIDIA CPUs — www.bleepingcomputer.com — 28.10.2025 19:00
-
Researchers demonstrated key extraction and attestation forgery.
First reported: 28.10.2025 19:001 source, 1 articleShow sources
- TEE.Fail attack breaks confidential computing on Intel, AMD, NVIDIA CPUs — www.bleepingcomputer.com — 28.10.2025 19:00
-
The attack can forge TDX attestations on Ethereum BuilderNet.
First reported: 28.10.2025 19:001 source, 1 articleShow sources
- TEE.Fail attack breaks confidential computing on Intel, AMD, NVIDIA CPUs — www.bleepingcomputer.com — 28.10.2025 19:00
-
The attack can extract ECDH private keys from enclaves.
First reported: 28.10.2025 19:001 source, 1 articleShow sources
- TEE.Fail attack breaks confidential computing on Intel, AMD, NVIDIA CPUs — www.bleepingcomputer.com — 28.10.2025 19:00
-
The attack can obtain the Provisioning Certificate Key (PCK) from a Xeon server.
First reported: 28.10.2025 19:001 source, 1 articleShow sources
- TEE.Fail attack breaks confidential computing on Intel, AMD, NVIDIA CPUs — www.bleepingcomputer.com — 28.10.2025 19:00
-
Intel, AMD, and NVIDIA have acknowledged the issues and are working on mitigations.
First reported: 28.10.2025 19:001 source, 1 articleShow sources
- TEE.Fail attack breaks confidential computing on Intel, AMD, NVIDIA CPUs — www.bleepingcomputer.com — 28.10.2025 19:00