Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-48869: Escalation of Privilege in Intel(R) Xeon(R) 6 processor with E-cores when using Intel(R) Trust Domain Extensions (Intel(R) TDX) or Intel(R) Software Guard Extensions (Intel(R) SGX)

0
Medium
VulnerabilityCVE-2024-48869cvecve-2024-48869
Published: Tue May 13 2025 (05/13/2025, 21:03:22 UTC)
Source: CVE
Vendor/Project: n/a
Product: Intel(R) Xeon(R) 6 processor with E-cores when using Intel(R) Trust Domain Extensions (Intel(R) TDX) or Intel(R) Software Guard Extensions (Intel(R) SGX)

Description

Improper restriction of software interfaces to hardware features for some Intel(R) Xeon(R) 6 processor with E-cores when using Intel(R) Trust Domain Extensions (Intel(R) TDX) or Intel(R) Software Guard Extensions (Intel(R) SGX) may allow a privileged user to potentially enable escalation of privilege via local access.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 20:24:41 UTC

Technical Analysis

CVE-2024-48869 is a vulnerability identified in Intel Xeon 6 processors equipped with E-cores, specifically when leveraging Intel Trust Domain Extensions (TDX) or Software Guard Extensions (SGX). These technologies are designed to provide hardware-based isolated execution environments to protect sensitive code and data from unauthorized access, even from privileged software such as operating systems or hypervisors. The vulnerability arises from improper restriction of software interfaces to certain hardware features within these processors, which can be exploited by a user who already has privileged local access to the system. By exploiting this flaw, the attacker can escalate their privileges beyond their current level, potentially gaining unauthorized control over protected enclaves or the broader system environment. The attack vector is local, requiring the attacker to have high privileges initially, and no user interaction is necessary. The vulnerability affects the confidentiality and integrity of data processed within TDX or SGX environments, as it undermines the isolation guarantees these technologies provide. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to environments relying on Intel's hardware-based security features, such as cloud service providers, data centers, and enterprises deploying confidential computing solutions. The CVSS 4.0 base score of 5.6 reflects a medium severity level, considering the high complexity of exploitation and the prerequisite of privileged access. Intel is expected to release patches or microcode updates to address this issue, and affected organizations should prioritize applying these updates once available.

Potential Impact

The primary impact of CVE-2024-48869 is the potential for privilege escalation within systems using Intel Xeon 6 processors with E-cores running Intel TDX or SGX. This can lead to unauthorized access to sensitive data and code protected by these hardware-based isolation technologies, undermining the confidentiality and integrity of critical workloads. Organizations relying on confidential computing for secure multi-tenant cloud environments, financial services, healthcare, or government applications could face data breaches or compromise of secure enclaves. The vulnerability requires local privileged access, limiting remote exploitation risk but increasing insider threat concerns. If exploited, attackers could bypass protections intended to isolate sensitive operations, potentially leading to lateral movement, data exfiltration, or disruption of secure services. The absence of known exploits reduces immediate risk, but the presence of a medium severity vulnerability in foundational hardware security features necessitates prompt attention to avoid future exploitation. The scope includes all systems deploying affected Intel Xeon 6 processors with E-cores and utilizing TDX or SGX, which are common in modern server and cloud infrastructures worldwide.

Mitigation Recommendations

1. Monitor Intel’s official advisories and apply firmware, microcode, and software patches promptly once released to address CVE-2024-48869. 2. Restrict and audit privileged local user access rigorously to minimize the risk of insider threats exploiting this vulnerability. 3. Employ strict access controls and segmentation to limit the number of users with high privileges on systems running TDX or SGX workloads. 4. Implement enhanced logging and anomaly detection focused on privileged operations within secure enclave environments to detect potential exploitation attempts. 5. Consider deploying additional layers of security such as hardware-based root of trust and runtime integrity monitoring to detect unauthorized privilege escalations. 6. For cloud providers, isolate tenant workloads and enforce strict tenant separation policies to reduce the impact of potential enclave compromise. 7. Regularly review and update security policies related to confidential computing and hardware security features to incorporate emerging threat intelligence and best practices. 8. Conduct security training for system administrators and privileged users emphasizing the risks associated with local privilege escalation vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2024-10-09T02:59:22.185Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec798

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 2/26/2026, 8:24:41 PM

Last updated: 3/22/2026, 2:53:38 PM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses