Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27572: Information Disclosure in TDX

0
Medium
VulnerabilityCVE-2025-27572cvecve-2025-27572
Published: Tue Feb 10 2026 (02/10/2026, 16:25:27 UTC)
Source: CVE Database V5
Product: TDX

Description

Exposure of sensitive information during transient execution for some TDX within Ring 0: Hypervisor may allow an information disclosure. Authorized adversary with a privileged user combined with a high complexity attack may enable data exposure. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (none) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

AI-Powered Analysis

AILast updated: 02/10/2026, 17:01:09 UTC

Technical Analysis

CVE-2025-27572 is an information disclosure vulnerability found in Intel's Trusted Domain Extensions (TDX), specifically within the Ring 0 hypervisor layer. The flaw arises from transient execution mechanisms that can leak sensitive information under certain conditions. An attacker with privileged local access (e.g., administrative or root level) and the ability to execute a complex attack can exploit this vulnerability to extract confidential data from the hypervisor environment. The attack does not require user interaction and does not need special internal knowledge beyond privilege, but it is considered high complexity due to the nature of transient execution exploitation. The vulnerability affects confidentiality with no direct impact on integrity or availability. The CVSS 4.0 score is 5.6 (medium), reflecting local attack vector, high attack complexity, no user interaction, and high confidentiality impact. No patches or exploits are currently publicly available, but the vulnerability highlights risks in TDX environments where hypervisor isolation is critical for security.

Potential Impact

For European organizations, the primary impact is the potential exposure of sensitive data in virtualized environments leveraging Intel TDX technology. This could include confidential business information, cryptographic keys, or personal data processed within virtual machines protected by TDX. Since the vulnerability requires privileged local access, the risk is heightened in environments where multiple tenants or administrators share infrastructure, such as cloud service providers or large enterprises using virtualization for workload isolation. The confidentiality breach could lead to compliance violations under GDPR if personal data is exposed. However, the lack of integrity or availability impact limits the scope to data leakage rather than system disruption. The medium severity suggests a moderate risk that should be addressed proactively, especially in sectors handling sensitive or regulated data.

Mitigation Recommendations

Organizations should implement strict access controls to limit privileged user accounts and monitor for unusual privileged activity within TDX-enabled environments. Applying vendor patches or microcode updates as soon as they become available is critical. Until patches are released, consider isolating TDX workloads on dedicated hardware or restricting access to trusted administrators only. Employ runtime monitoring and anomaly detection to identify potential exploitation attempts. Additionally, review and harden hypervisor configurations to minimize attack surface. For cloud providers, segregate tenant workloads and enforce strict privilege separation. Regularly update threat intelligence feeds and coordinate with Intel advisories for emerging mitigation techniques. Finally, conduct security audits focusing on privileged access management and transient execution attack vectors.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
intel
Date Reserved
2025-04-15T21:18:07.419Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698b5d5d4b57a58fa119cf3e

Added to database: 2/10/2026, 4:31:25 PM

Last enriched: 2/10/2026, 5:01:09 PM

Last updated: 2/21/2026, 12:19:41 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats