Google-Intel Security Audit Reveals Severe TDX Vulnerability Allowing Full Compromise - SecurityWeek
4 min read
|
Saved February 14, 2026
|
Copied!
Do you care about this?
A security audit by Google and Intel uncovered five vulnerabilities in Intel's TDX technology, including one severe flaw (CVE-2025-30513) that allows an attacker to fully compromise the system. Intel has issued patches for these vulnerabilities, which can lead to privilege escalation and information disclosure.
If you do, here's more
A recent security audit by Google and Intel uncovered significant vulnerabilities in Intel's Trusted Domain Extensions (TDX). The audit pinpointed five vulnerabilities, including CVE-2025-30513, which allows an untrusted host to fully compromise TDX security. This particular vulnerability enables an attacker to convert a migratable Trusted Domain (TD) into a debuggable one during migration. By exploiting a Time-of-Check to Time-of-Use flaw, the attacker can access the TD's decrypted state. Once compromised, a malicious host can monitor the TD or recreate it using the decrypted data.
Intel has addressed these vulnerabilities with patches, detailed in their advisory published on Tuesday. Googleβs findings included a comprehensive 85-page technical report that elaborates on the vulnerabilities and their implications. The report stresses how the timing of TD migrations can leave systems vulnerable, especially after the TD has undergone attestation. This level of access poses significant risks, as it allows attackers to exploit sensitive information during a TD's lifecycle.
Questions about this article
No questions yet.