Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-22885: Escalation of Privilege in TDX Module may allow an escalation of privilege. System software adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (low) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

0
Medium
VulnerabilityCVE-2025-22885cvecve-2025-22885
Published: Tue Feb 10 2026 (02/10/2026, 16:25:15 UTC)
Source: CVE Database V5
Product: TDX Module may allow an escalation of privilege. System software adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (low) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

Description

Improper buffer restrictions in the firmware for the TDX Module may allow an escalation of privilege. System software adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (low) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

AI-Powered Analysis

AILast updated: 02/10/2026, 17:03:02 UTC

Technical Analysis

CVE-2025-22885 is a vulnerability identified in the firmware of the Intel Trust Domain Extensions (TDX) Module, which is designed to provide hardware-based isolation for virtual machines. The flaw arises from improper buffer restrictions within the TDX firmware, enabling a system software adversary who already has privileged user access to escalate their privileges further. Exploitation requires local access and is characterized by high attack complexity, meaning it is not trivial to execute and likely requires specialized skills or conditions. No user interaction is necessary, and the attack does not require special internal knowledge, indicating that once the attacker has privileged access, they can leverage this vulnerability without additional insider information. The vulnerability primarily threatens the confidentiality of the system, potentially allowing unauthorized disclosure of sensitive information. Integrity impact is assessed as low, and availability is not impacted. The CVSS 4.0 vector (AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N) reflects that the attack is local, requires high complexity, no user interaction, and privileges are already high. No known exploits have been reported in the wild, and no patches are currently linked, indicating the need for vigilance and monitoring for updates from Intel. This vulnerability is significant in environments where TDX is deployed to protect sensitive workloads, such as cloud providers or enterprises using confidential computing technologies.

Potential Impact

For European organizations, the primary impact of CVE-2025-22885 lies in the potential compromise of confidentiality within systems utilizing Intel TDX technology. Organizations relying on TDX for hardware-based isolation of virtual machines, particularly in sectors handling sensitive data such as finance, healthcare, and government, could face unauthorized data disclosure if an attacker with privileged local access exploits this vulnerability. Although the integrity and availability impacts are low or none, the breach of confidentiality could lead to exposure of intellectual property, personal data, or other sensitive information, triggering regulatory compliance issues under GDPR and damaging organizational reputation. The requirement for privileged local access and high attack complexity reduces the likelihood of widespread exploitation but does not eliminate risk in environments where insider threats or compromised privileged accounts exist. The absence of user interaction lowers the chance of detection during exploitation. The vulnerability could also affect cloud service providers in Europe offering confidential computing services based on Intel TDX, potentially impacting multiple tenants if exploited.

Mitigation Recommendations

European organizations should prioritize the following mitigation steps: 1) Monitor Intel’s security advisories closely and apply firmware updates or patches for the TDX Module as soon as they become available. 2) Restrict and tightly control privileged local access to systems running TDX-enabled firmware, employing strict access controls and auditing to detect unauthorized privilege escalations. 3) Implement robust endpoint security solutions capable of detecting anomalous behavior indicative of privilege escalation attempts. 4) Employ hardware-based attestation and integrity verification mechanisms to detect unauthorized firmware modifications. 5) Use network segmentation and isolation to limit the ability of attackers to gain local privileged access. 6) Conduct regular security training and awareness programs to reduce insider threat risks. 7) For cloud providers, enforce tenant isolation and monitor for suspicious activities within TDX-protected environments. 8) Incorporate vulnerability scanning and penetration testing focused on privileged access controls and firmware security to identify potential exploitation paths before attackers do.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
intel
Date Reserved
2025-01-23T03:59:09.855Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698b5d5c4b57a58fa119cf0d

Added to database: 2/10/2026, 4:31:24 PM

Last enriched: 2/10/2026, 5:03:02 PM

Last updated: 2/20/2026, 9:03:54 PM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats