CVE-2025-27940
Out-of-Bounds Read in Intel TDX Module Causes Data Disclosure
Publication date: 2026-02-10
Last updated on: 2026-02-10
Assigner: Intel Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| intel | tdx_module | to tdx1.5 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-125 | The product reads data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an out-of-bounds read issue in some versions of the TDX Module before version tdx1.5. It occurs within Ring 0, where the hypervisor may allow an information disclosure. Essentially, a software side channel adversary with privileged user access and a high complexity attack could potentially expose sensitive data. The attack requires local access, does not need special internal knowledge, and does not require user interaction.
How can this vulnerability impact me? :
The vulnerability primarily impacts the confidentiality of the system, potentially allowing sensitive information to be disclosed. It does not affect the integrity or availability of the system. The attack requires a privileged user and local access, and it is considered a high complexity attack.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know