ATLA WIRE

New TEE.Fail Side-Channel Attack Extracts Secrets from Intel and AMD DDR5 Secure Enclaves

30.10.2025
12471
New TEE.Fail Side-Channel Attack Extracts Secrets from Intel and AMD DDR5 Secure Enclaves
TEE.Fail shows how $1,000 hardware can extract keys from Intel and AMD DDR5 secure enclaves.

TEE.Fail Attack: Your $1K Hardware Can Now Crack Intel & AMD DDR5 Secure Enclaves

Researchers just dropped TEE.Fail — a brutal side-channel attack that extracts encryption keys and other secrets from Intel and AMD DDR5 secure enclaves using off-the-shelf hardware costing just $1,000.
This isn't theoretical — it's a practical exploit that bypasses the hardware-level security protecting your most sensitive data in trusted execution environments.
The attack specifically targets DDR5 memory modules in both Intel and AMD systems, demonstrating that even the latest memory technology isn't immune to sophisticated side-channel techniques.
What makes this particularly dangerous is the low barrier to entry — attackers don't need million-dollar lab equipment. For about the price of a high-end gaming GPU, they can build the hardware needed to pull this off.
The research exposes fundamental vulnerabilities in how secure enclaves handle memory access patterns, allowing attackers to infer cryptographic keys and extract protected information without direct access to the enclave itself.
Both Intel and AMD are affected, meaning virtually all modern high-performance computing systems using DDR5 memory with secure enclave technology are potentially vulnerable to this class of attack.
This represents a significant escalation in hardware-based attacks, moving from academic curiosities to practical threats that could be deployed in real-world scenarios against enterprise systems, cloud infrastructure, and high-security computing environments.
#side-channel attacks#hack#cybersecurity#key leakage#CVE vulnerabilities
Got a topic? Write to ATLA WIRE on Telegram:t.me/atla_community
Banner | ATLA WIRE