Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Waymo temporarily suspends service in San Francisco as robotaxis stall due to power outage

Electrical startups raise concerns as EU wateres down 2035 EV targets

Famous Israeli VC John Medved, who was diagnosed with ALS, championed technology to improve his life.

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Three weaknesses in PCIe encryption expose PCIe 5.0+ systems to data processing flaws
Identity

Three weaknesses in PCIe encryption expose PCIe 5.0+ systems to data processing flaws

userBy userDecember 10, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

December 10, 2025Ravi LakshmananHardware security/vulnerabilities

Three security vulnerabilities have been disclosed in the Peripheral Component Interconnect Express (PCIe) Integrity and Data Encryption (IDE) protocol specification that could expose local attackers to significant risk.

According to the PCI Special Interest Group (PCI-SIG), this flaw affects PCIe Base Spec Revision 5.0 and later, a protocol mechanism introduced by an IDE Engineering Change Notice (ECN).

“Depending on the implementation, this could result in one or more of the following security breaches for the affected PCIe components: (i) information disclosure, (ii) privilege escalation, or (iii) denial of service,” the consortium notes.

PCIe is a widely used high-speed standard for connecting hardware peripherals and components such as graphics cards, sound cards, Wi-Fi and Ethernet adapters, and storage devices inside computers and servers. PCIe IDE, introduced in PCIe 6.0, is designed to secure data transfers through encryption and integrity protection.

cyber security

The three IDE vulnerabilities discovered by Intel employees Arie Aharon, Makaram Raghunandan, Scott Constable, and Shalini Sharma are listed below.

CVE-2025-9612 (Forbidden IDE Reordering) – Missing integrity check on the receive port allows reordering of PCIe traffic, potentially causing the receiver to process stale data. CVE-2025-9613 (Completion Timeout Redirect) – Incomplete flushing of the completion timeout could allow a receiver to accept malformed data when an attacker injects a packet with a matching tag. CVE-2025-9614 (Lazy Post Redirect) – Incomplete flushing or rekeying of an IDE stream could allow the receiver to consume stale and malformed data packets.

PCI-SIG stated that successful exploitation of the aforementioned vulnerabilities could compromise the confidentiality, integrity, and security objectives of the IDE. However, this attack relies on gaining physical or low-level access to the targeted computer’s PCIe IDE interface, making it a low-severity bug (CVSS v3.1 score: 3.0/CVSS v4 score: 1.8).

“All three vulnerabilities could expose IDEs and systems that implement Trusted Domain Interface Security Protocol (TDISP) to attackers, potentially compromising the isolation between trusted execution environments.”

cyber security

In an advisory released Tuesday, the CERT Coordination Center (CERT/CC) urged manufacturers to follow the updated PCIe 6.0 standard and apply Erratum #1 guidance to their IDE implementations. Intel and AMD have issued their own alerts stating that the issue affects the following products:

Intel Xeon 6 processor with P core Intel Xeon 6700P-B/6500P-B series SoC with P core. AMD EPYC 9005 Series Processor AMD EPYC Embedded 9005 Series Processor

“End users should apply firmware updates provided by their system or component suppliers, especially in environments that rely on IDEs to protect sensitive data,” CERT/CC said.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleGoogle invests in Fervo’s $462 million round to unlock more geothermal energy
Next Article Petco shuts down Vetco website after exposing customers’ personal information
user
  • Website

Related Posts

Iran’s Infy APT resurfaces with new malware activity after years of silence

December 21, 2025

US Department of Justice charges $54 for ATM jackpotting scheme using Ploutus malware

December 20, 2025

Russian-linked hackers use Microsoft 365 device code phishing to take over accounts

December 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Waymo temporarily suspends service in San Francisco as robotaxis stall due to power outage

Electrical startups raise concerns as EU wateres down 2035 EV targets

Famous Israeli VC John Medved, who was diagnosed with ALS, championed technology to improve his life.

Iran’s Infy APT resurfaces with new malware activity after years of silence

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.