CVE-2025-32007
Out-of-Bounds Read in Intel TDX Module Allows Data Disclosure
Publication date: 2026-02-10
Last updated on: 2026-02-10
Assigner: Intel Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| intel | tdx_module | 1.5.24 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-125 | The product reads data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an out-of-bounds read issue in some versions of the Intel TDX module before version 1.5.24. It occurs within Ring 0, the hypervisor level, and may allow an authorized adversary with privileged user access to disclose information. The attack complexity is low and does not require user interaction, but it does require local access and privileged user rights.
How can this vulnerability impact me? :
The vulnerability can impact the confidentiality of the system by potentially exposing sensitive data. It does not affect the integrity or availability of the system. An attacker with the required privileges and local access could exploit this vulnerability to gain unauthorized information disclosure.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know