InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: New TEE.Fail side-channel attack extracts secrets from Intel and AMD DDR5 secure enclaves
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > New TEE.Fail side-channel attack extracts secrets from Intel and AMD DDR5 secure enclaves
Technology

New TEE.Fail side-channel attack extracts secrets from Intel and AMD DDR5 secure enclaves

October 28, 2025 4 Min Read
Share
New TEE.Fail side-channel attack extracts secrets from Intel and AMD DDR5 secure enclaves
SHARE

A group of academic researchers from Georgia Tech, Purdue University, and Synchronics developed a side-channel attack called . TEE. Failure This allows secrets to be extracted from the trusted execution environment (TEE) of the computer’s main processor, such as Intel’s Software Guard eXtensions (SGX) and Trust Domain Extensions (TDX), AMD’s Secure Nested Paging (SEV-SNP) and Secure Encrypted Virtualization with Ciphertext Hiding.

The core of this attack involves the use of an intervention device built using off-the-shelf electronics that costs less than $1,000 and allows for physical inspection of all memory traffic within a DDR5 server.

“This makes it possible for the first time to extract cryptographic keys from Intel TDX and AMD SEV-SNPs with ciphertext hiding capabilities, including in some cases secret authentication keys from fully updated machines in a trusted state,” the researchers wrote on the information site.

“In addition to subverting CPU-based TEEs, we also show how extracted authentication keys can be used to compromise Nvidia’s GPU Confidential Computing, allowing attackers to run AI workloads without TEE protection.”

This finding comes weeks after the release of two other TEE attacks, including Battering RAM and WireTap. Unlike these techniques that target systems using DDR4 memory, TEE.Fail is the first proven attack against DDR5, meaning it can be used to undermine the latest hardware security protections from Intel and AMD.

A recent study found that the AES-XTS encryption mode used by Intel and AMD is not sufficient to prevent physical memory intervention attacks because it is deterministic. In a hypothetical attack scenario, an attacker could leverage custom equipment to record memory traffic flowing between the computer and DRAM, opening the door to side-channel attacks by observing the memory contents during read and write operations.

This could ultimately be exploited to extract data from sensitive virtual machines (CVMs), including ECDSA authentication keys from Intel’s Provisioning Certification Enclave (PCE), which are needed to break SGX and TDX certifications.

See also  From Log4j to IIS, Chinese hackers turn legacy bugs into global spying tools

“Attestation is a mechanism used to prove that data and code are actually running inside a CVM, and therefore means that data and code can pretend to be running inside a CVM when in fact they are not,” the researchers said. “They can even read data and provide false output while faking a successfully completed authentication process.”

The study also pointed out that SEV-SNP with ciphertext hiding does not address the problem of deterministic encryption, nor does it prevent the intervention of a physical bus. As a result, this attack facilitates the extraction of private signing keys from OpenSSL’s ECDSA implementation.

“Importantly, OpenSSL’s encryption code is fully punctual and ciphertext hiding was enabled on our machine, indicating that these features are not sufficient to mitigate bus intervention attacks,” they added.

Although there is no evidence that this attack has been used in the wild, researchers recommend using software countermeasures to reduce the risks posed as a result of deterministic encryption. However, it can be expensive.

Following this disclosure, AMD stated that it has no plans to provide any mitigations as physical vector attacks are not covered by AMD SEV-SNP. Intel noted in a similar warning that TEE.fail does not change the company’s previous out-of-bounds statements against this type of physical attack.

Share This Article
Twitter Copy Link
Previous Article Best Outer Worlds 2 MOD Best Outer Worlds 2 MOD
Next Article Immigration agents are raiding hospitals and clinics in California. Could a new state law prevent that? Immigration agents are raiding hospitals and clinics in California. Could a new state law prevent that?

Latest News

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

threat actor known as silver fox In attacks targeting Chinese…

December 4, 2025
Critical RSC bug in React and Next.js allows unauthenticated remote code execution

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

A maximum severity security flaw has been disclosed in React…

December 3, 2025
India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India's Department of Telecommunications (DoT) has directed app-based telecom service…

December 2, 2025
India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India's Ministry of Telecommunications has reportedly asked major mobile device…

December 1, 2025
CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated…

November 30, 2025

You Might Also Like

New Fluent Bit flaw exposes cloud to RCE and stealth infrastructure intrusions
Technology

New Fluent Bit flaw exposes cloud to RCE and stealth infrastructure intrusions

4 Min Read
ShadowRay 2.0 exploits unpatched Ray flaw to build self-spreading GPU cryptomining botnet
Technology

ShadowRay 2.0 exploits unpatched Ray flaw to build self-spreading GPU cryptomining botnet

5 Min Read
Batshadow Group hunts job seekers using the new GO-based "Vampire Bot" malware
Technology

Batshadow Group hunts job seekers using the new GO-based “Vampire Bot” malware

4 Min Read
Matrix Push C2 uses browser notifications for fileless, cross-platform phishing attacks
Technology

Matrix Push C2 uses browser notifications for fileless, cross-platform phishing attacks

6 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?