TEE.Fail Attack Exposes Secrets from Trusted Execution Environments

Cyber Security News by CyberSum.net
2 sources
Researchers developed TEE.Fail, a side-channel attack targeting trusted execution environments (TEEs) in CPUs like Intel's SGX and AMD's SEV-SNP. Using off-the-shelf equipment costing under $1,000, the attack extracts cryptographic keys by interposing on DDR5 memory traffic. The study highlights vulnerabilities in deterministic AES-XTS encryption and demonstrates key extraction from confidential virtual machines. While Intel and AMD acknowledge the findings, they consider physical attacks out of scope for mitigation.