The latest security information on Intel® products.
TDXDown
Announcement ID:
2024-10-08-001
Issue:
On October 8, 2024, researchers from University of Lübeck published a paper titled “TDXDown: Single-Stepping and Instruction Counting Attacks against Intel TDX”. Researchers describe what they characterize as two potential vulnerabilities in defense-in-depth features in Intel® Trust Domain Extensions (TDX); claiming that these limitations may make it easier for an attacker with full control of the Virtual Machine Manager (VMM) to exploit vulnerabilities that already exist in cryptographic software running in an Intel TDX Trust Domain (TD).
Intel’s analysis is that the first technique described in the paper violates the intended purpose of the specific defense-in-depth feature that may allow partial information disclosure and we have updated the feature in Intel TDX module version 1.5.06.
Researchers demonstrated exploitation of specific open source cryptographic libraries but it should be noted that these libraries contained exploitable vulnerabilities that need to be addressed by their respective maintainers. These vulnerabilities are independent of Intel TDX and may be exploitable in non-TDX environments.
Their paper also described a second technique referred to as StumbleStepping which allows the inference of the number of instructions which have been executed by the TD. Intel does not consider this technique to be in the scope of the defense-in-depth mechanisms. There is no assigned CVE or CVSS score for the StumbleStepping issue.
Resolution/Recommendations:
This issue, with a CVSS 3.1 severity score of 2.5 (low), represents very little risk in real world environments but Intel recommends customers install TDX module 1.5.06 (or later) which contains an updated defense-in-depth mechanism to address the weakness described in the paper. Intel also recommends customers keep third party cryptographic libraries they may be using up to date.
Additional resources:
Legal Notices and Disclaimers
Intel provides these materials as-is, with no express or implied warranties.
All products, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice.
Intel products and services described may contain design defects or errors known as errata, which may cause the product to deviate from published specifications. Current characterized errata are available on request.
Intel products that have met their End of Servicing Updates may no longer receive functional and security updates. For additional details on support and servicing, please see this help article.
Intel technologies’ features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No product or component can be absolutely secure. Check with your system manufacturer or retailer or learn more at http://intel.com.
Some results have been estimated or simulated using internal Intel analysis or architecture simulation or modeling, and provided to you for informational purposes. Any differences in your system hardware, software or configuration may affect your actual performance.
© Intel Corporation. Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries United States and other countries. Other names and brands may be claimed as the property of others.
Report a Vulnerability
If you have information about a security issue or vulnerability with an Intel branded product or technology, please send an e-mail to secure@intel.com. Encrypt sensitive information using our PGP public key.
Please provide as much information as possible, including:
- The products and versions affected
- Detailed description of the vulnerability
- Information on known exploits
A member of the Intel Product Security Team will review your e-mail and contact you to collaborate on resolving the issue. For more information on how Intel works to resolve security issues, see:
For issues related to Intel's external web presence (Intel.com and related subdomains), please contact Intel's External Security Research team.
Need product support?
If you...
- Have questions about the security features of an Intel product
- Require technical support
- Want product updates or patches
Please visit Support & Downloads.