New TEE.Fail Attack Reveals Secrets from Intel and AMD DDR5 Secure Enclaves

Published:

spot_img

Researchers Unveil TEE.Fail: A New Side-Channel Attack on Trusted Execution Environments

Introduction to TEE.Fail

A collaboration between academic researchers from Georgia Tech, Purdue University, and Synkhronix has led to a significant breakthrough in cybersecurity with the development of a side-channel attack known as TEE.Fail. This attack exposes vulnerabilities within the trusted execution environment (TEE) of main processors. Specifically, it targets Intel’s Software Guard eXtensions (SGX) and Trust Domain Extensions (TDX), along with AMD’s Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP) and its Ciphertext Hiding feature.

How TEE.Fail Works

At the heart of TEE.Fail is an innovative interposition device assembled with readily available electronic components that cost under $1,000. This device allows attackers to physically monitor all memory traffic within a DDR5 server. The researchers reported that this capability enables the extraction of cryptographic keys from Intel’s TDX and AMD’s SEV-SNP, which can include secret attestation keys from fully updated systems recognized as “trusted.”

Implications for Hardware Security

The researchers behind TEE.Fail emphasized that the attack not only compromises CPU-based TEEs but also poses risks to Nvidia’s GPU Confidential Computing. This vulnerability allows attackers to execute AI workloads without the protections typically provided by TEEs. The study highlights this newfound capability as particularly concerning, given the increasing reliance on secure environments for sensitive workloads.

Comparison with Previous Attacks

TEE.Fail is a timely addition to the ongoing conversation about the security of TEEs, emerging shortly after the introduction of other attacks like Battering RAM and WireTap. Unlike these previous methods, which primarily targeted systems utilizing DDR4 memory, TEE.Fail stands out as the first method to successfully breach DDR5 security measures. Its ability to undermine the latest hardware protections from both Intel and AMD marks a critical evolution in the landscape of cybersecurity threats.

Deterministic Encryption and Vulnerabilities

One of the critical findings of the study is the deterministic nature of the AES-XTS encryption mode employed by both Intel and AMD, which falls short in preventing physical memory interposition attacks. In a hypothetical attack scenario, adversaries can use custom equipment to log memory traffic flowing between the central processing unit (CPU) and dynamic random-access memory (DRAM). This process involves observing memory contents during read and write operations, setting the stage for a successful side-channel attack.

Potential Data Extraction

Through TEE.Fail, attackers could potentially extract sensitive data from confidential virtual machines (CVMs), including ECDSA attestation keys from Intel’s Provisioning Certification Enclave (PCE). This access is crucial for undermining SGX and TDX attestation processes. The research team indicated that employing attestation is vital for confirming that data and code are executing within a CVM. If compromised, attackers can simulate the existence of CVMs, leading to unauthorized data access and misleading outputs, all while falsifying successful attestation.

Limitations of Current Security Features

The study critically assesses the efficacy of SEV-SNP with Ciphertext Hiding, noting that it does not resolve issues related to deterministic encryption or prevent physical bus interposition attacks. Consequently, this vulnerability can lead to unauthorized extraction of private signing keys from OpenSSL’s ECDSA implementation, further diminishing confidence in current security measures.

Despite the use of OpenSSL’s cryptographic code, which is designed to operate in constant time and with Ciphertext Hiding enabled on the system, the researchers found that these features are insufficient to counteract bus interposition attacks effectively.

Mitigation Recommendations and Industry Response

While there are no confirmed instances of TEE.Fail being used in real-world attacks, the researchers advise employing software countermeasures to address the risks associated with deterministic encryption. However, implementing these measures could incur significant costs. In light of these findings, AMD has stated it will not provide mitigations since physical vector attacks are not considered within the scope of AMD SEV-SNP. Intel similarly noted that TEE.Fail aligns with previously outlined limitations concerning physical attacks, reaffirming their stance on the issue.

Final Thoughts

The emergence of TEE.Fail marks an important chapter in cybersecurity, highlighting the continual evolution of threats against trusted execution environments. As researchers and organizations alike grapple with these vulnerabilities, it remains clear that the cybersecurity landscape is as dynamic as ever, calling for ongoing vigilance and adaptive security measures.

spot_img

Related articles

Recent articles

China’s CPPCC National Committee Strengthens Development with 99.9% Proposal Response Rate at 14th Session Opening

China's CPPCC National Committee Strengthens Development with 99.9% Proposal Response Rate at 14th Session Opening BEIJING, CHINA - On March 7, 2026, the fourth session...

Kiztopia Strengthens Presence in Malaysia with Grand Opening of New Family Edutainment Centre in Johor Bahru

Kiztopia Strengthens Presence in Malaysia with Grand Opening of New Family Edutainment Centre in Johor Bahru JOHOR BAHRU, MALAYSIA – Kiztopia, a prominent family edutainment...

Quantum Computing in Cybersecurity Market Set to Surge 24.10% CAGR by 2032, Led by IBM and Google Quantum AI

Quantum Computing in Cybersecurity Market Set to Surge 24.10% CAGR by 2032, Led by IBM and Google Quantum AI The global Quantum Computing in Cybersecurity...

Trump Unveils 2026 Cyber Strategy to Strengthen Defense Against Hackers and Global Scams

Trump Unveils 2026 Cyber Strategy to Strengthen Defense Against Hackers and Global Scams The White House has unveiled a comprehensive cybersecurity strategy for 2026, aiming...