CVE-2025-9614
Analyzed Analyzed - Analysis Complete
BaseFortify

Publication date: 2025-12-09

Last updated on: 2026-01-14

Assigner: CERT/CC

Description
An issue was discovered in the PCI Express (PCIe) Integrity and Data Encryption (IDE) specification, where insufficient guidance on re-keying and stream flushing during device rebinding may allow stale write transactions from a previous security context to be processed in a new one. This can lead to unintended data access across trusted domains, compromising confidentiality and integrity.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-09
Last Modified
2026-01-14
Generated
2026-05-07
AI Q&A
2025-12-09
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
pcisig pci_express_integrity_and_data_encryption *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-NVD-CWE-noinfo
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is in the PCI Express (PCIe) Integrity and Data Encryption (IDE) specification. It arises because there is insufficient guidance on re-keying and stream flushing when a device is rebound. As a result, stale write transactions from a previous security context might be processed in a new security context, potentially allowing unintended data access across trusted domains and compromising data confidentiality and integrity.


How can this vulnerability impact me? :

The vulnerability can lead to unintended data access across trusted domains, which means that sensitive information could be exposed or altered without authorization. This compromises the confidentiality and integrity of data, potentially leading to data breaches or corruption in systems using PCIe IDE.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart