CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

TEE.Fail attack exploits Intel, AMD, and NVIDIA CPUs

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

Academic researchers have developed a side-channel attack called TEE.Fail, which can extract secrets from the trusted execution environment (TEE) in Intel, AMD, and NVIDIA CPUs. The attack targets DDR5 systems and exploits weaknesses in modern implementations of Intel SGX, Intel TDX, and AMD SEV-SNP. The TEE is a highly secure area within the CPU designed to ensure the confidentiality and integrity of sensitive data. The attack requires physical access and root-level privileges, but no chip-level expertise. Researchers demonstrated the ability to forge attestations, extract private keys, and breach confidentiality. The attack is complex and less practical for average users but highlights significant vulnerabilities in confidential computing. The researchers reported their findings to Intel, AMD, and NVIDIA, who acknowledged the issues and are working on mitigations.

Timeline

  1. 28.10.2025 19:00 1 articles · 13d ago

    TEE.Fail attack demonstrated on Intel, AMD, and NVIDIA CPUs

    Researchers from Georgia Tech and Purdue University developed TEE.Fail, a side-channel attack that extracts secrets from TEEs in Intel, AMD, and NVIDIA CPUs. The attack targets DDR5 systems and exploits weaknesses in modern implementations of Intel SGX, Intel TDX, and AMD SEV-SNP. The researchers demonstrated key extraction, attestation forgery, and confidentiality breaches. Intel, AMD, and NVIDIA acknowledged the issues and are working on mitigations.

    Show sources

Information Snippets