Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-26403: Escalation of Privilege in Intel(R) Xeon(R) 6 processors when using Intel(R) SGX or Intel(R) TDX

0
Medium
VulnerabilityCVE-2025-26403cvecve-2025-26403
Published: Tue Aug 12 2025 (08/12/2025, 16:59:17 UTC)
Source: CVE Database V5
Product: Intel(R) Xeon(R) 6 processors when using Intel(R) SGX or Intel(R) TDX

Description

Out-of-bounds write in the memory subsystem for some Intel(R) Xeon(R) 6 processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 01:12:54 UTC

Technical Analysis

CVE-2025-26403 is a vulnerability identified in certain Intel Xeon 6 processors when operating with Intel Software Guard Extensions (SGX) or Intel Trust Domain Extensions (TDX). The flaw is an out-of-bounds write within the processor’s memory subsystem, which can be triggered by a privileged local user. This memory corruption could potentially allow escalation of privilege, enabling the attacker to gain higher-level access than normally permitted. The vulnerability requires the attacker to already have high privileges on the system (e.g., administrative or root access) and local access to the machine, making remote exploitation infeasible. Intel SGX and TDX are technologies designed to create isolated execution environments for sensitive workloads, so a vulnerability here could undermine the security guarantees of these trusted execution environments. The CVSS 4.0 vector indicates a local attack vector (AV:L), high attack complexity (AC:H), no privileges required beyond high privilege (PR:H), no user interaction (UI:N), and no impact on confidentiality, integrity, or availability beyond the scope of the privileged user (VC:N, VI:N, VA:N). The scope is high (S:H) because the vulnerability affects the security boundaries of the trusted execution environments. No known exploits have been reported in the wild, and Intel has reserved and published the CVE with a medium severity rating (4.5). The affected versions and patch details are not specified in the provided information, but organizations using these processors with SGX or TDX should anticipate vendor advisories and updates.

Potential Impact

The primary impact of CVE-2025-26403 is the potential for a privileged local user to escalate their privileges beyond intended limits by exploiting an out-of-bounds write in the memory subsystem of Intel Xeon 6 processors using SGX or TDX. This could compromise the integrity of trusted execution environments, potentially allowing attackers to access or manipulate sensitive data or code protected by SGX/TDX. While the vulnerability does not enable remote exploitation or affect confidentiality or availability directly, it weakens the security model of hardware-based trusted execution, which is critical for cloud providers, enterprises running confidential workloads, and environments requiring strong isolation. If exploited, it could facilitate further attacks such as privilege escalation, unauthorized code execution, or bypassing security controls within the affected system. The requirement for high privileges and local access limits the scope to insiders or attackers who have already compromised the system to some extent. However, the erosion of trusted execution environment security could have cascading effects on data protection and compliance in sensitive sectors.

Mitigation Recommendations

To mitigate CVE-2025-26403, organizations should: 1) Monitor Intel’s official advisories and apply firmware and microcode updates as soon as patches become available to address the out-of-bounds write vulnerability. 2) Restrict and tightly control privileged local access to systems running affected Intel Xeon 6 processors with SGX or TDX, employing the principle of least privilege and strong authentication mechanisms. 3) Employ robust endpoint detection and response (EDR) solutions to monitor for unusual local activity that could indicate attempts to exploit privilege escalation. 4) Use hardware and software-based security controls to limit the ability of privileged users to execute arbitrary code or modify memory in sensitive environments. 5) Conduct regular security audits and vulnerability assessments focusing on trusted execution environments and privileged user activities. 6) Consider isolating critical workloads in separate hardware or virtual environments to reduce the risk of privilege escalation impacting multiple systems. 7) Educate system administrators and security teams about the risks associated with privileged local access and the importance of timely patching.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2025-03-27T03:00:26.075Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 689b7751ad5a09ad0034935f

Added to database: 8/12/2025, 5:18:09 PM

Last enriched: 2/27/2026, 1:12:54 AM

Last updated: 3/23/2026, 12:20:46 PM

Views: 131

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses