Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Intel: Google Helped Us Find Vulnerabilities In Xeon’s TDX Security Feature

CRN by CRN
February 10, 2026
Home News
Share on FacebookShare on Twitter


In detailing vulnerabilities that Intel later remediated, Google’s security researchers say the most significant one they found in the Xeon confidential computing feature ‘would have allowed an untrusted operator to completely compromise the security guarantees of TDX.’

Intel said Tuesday that Google’s cloud security team helped the chipmaker identify five vulnerabilities in the most advanced confidential computing feature of its Xeon CPUs.

The work, which resulted in the remediation of such vulnerabilities, was part of a five-month joint security review between Intel and Google security researchers into the code for version 1.5 of the semiconductor giant’s Trust Domain Extensions feature.

[Related: 5 Ways AI Chips Are Accelerating Security Advancements]

With the review representing an ongoing collaboration between the two companies, Google’s security researchers said the “complexity of modern systems makes continuous assessment essential,” adding that “collaborative reviews allow industry leaders to proactively fix vulnerabilities while fostering transparency for everyone who relies on the technology.”

“This research illustrates why Intel is committed to never stop looking for security issues in our products,” Intel said in its own statement announcing Google’s research findings. “Customers can take confidence that it’s not just Intel working to strengthen our technology, but the ecosystem working together to enhance protection.”

Shortened as TDX, Trust Domain Extensions represents the most advanced confidential computing feature in Intel’s Xeon processors, and it’s used by Google Cloud, Microsoft Azure and Alibaba Cloud to offer additional protection for customer data.

The feature is designed to protect sensitive data and applications from unauthorized access by isolating virtual machines from the hypervisor and other software. It’s available in the fifth-generation Xeon and Xeon 6 product lines while availability in the fourth generation is limited to custom models for cloud service providers.

In a blog post, Google’s security researchers said the most significant vulnerability it found related to the Live Migration feature of TDX 1.5. This “would have allowed an untrusted operator to completely compromise the security guarantees of TDX,” they wrote.

The vulnerability allowed the host of a TDX environment to access a hardware-isolated virtual machine—also known as a Trust Domain, or TD for short—when using Live Migration to move the instance to another physical machine by changing its attributes from “migratable” to “debug,” the researchers said.

“Once triggered the entire decrypted TD state is accessible from the host. At this point a malicious host could construct another TD with the decrypted state or perform live monitoring activities,” they wrote, adding that such actions could be completed after a TD “completed attestation” to indicate that it’s protected.

This and four other vulnerabilities found by Google’s team were patched by Intel in the most recent version of the TDX Module code for Xeon processors, according to the chipmaker.

The security review also resulted in Google researchers finding 35 “less critical” weaknesses, bugs and improvement opportunities. Some of these smaller issues are expected to be addressed in future TDX Module code updates.

Among the recommendations from Google researchers is an architecture improvement they call Attestable Global Feature Disablement, which the team said “would limit attack surface growth by allowing a host to enable only used features and interfaces during TDX Module initialization.”

The Google security researchers said they identified the TDX security issues between the spring and fall of last year by performing a “thorough API review” of changes since TDX version 1.0. This work was augmented with the use of static analysis tools and the development of a “bespoke Python-based experimentation framework” called TDXplore to “explore complex flows and edge cases,” according to the team.

The researchers said they also “leveraged” Google’s Gemini 2.5 Pro AI reasoning model and NotebookLM AI research tool to “navigate technical specifications and aid with analysis.”



Source link

Tags: CPUsVulnerabilities
CRN

CRN

Next Post
MTN distribuirá Amazon Leo para su despliegue global

MTN distribuirá Amazon Leo para su despliegue global

Recommended.

Services PMI® at 53.8%; January 2026 ISM® Services PMI® Report

Services PMI® at 53.8%; January 2026 ISM® Services PMI® Report

February 4, 2026
5 Companies That Came To Win This Week

5 Companies That Came To Win This Week

October 24, 2025

Trending.

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

March 10, 2026
Huawei lanceert Next Generation FAN-oplossing

Huawei lanceert Next Generation FAN-oplossing

March 7, 2026
Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

February 26, 2026
Half of Google’s software development now AI-generated | Computer Weekly

Half of Google’s software development now AI-generated | Computer Weekly

February 5, 2026
Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

March 24, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio