New physical attacks are quickly diluting secure enclave defenses from Nvidia, AMD, and Intel

Ars TechnicaCenterEN 11 min read 100% complete by Dan Goodin October 29, 2025 at 02:40 PM
New physical attacks are quickly diluting secure enclave defenses from Nvidia, AMD, and Intel

AI Summary

long article 11 min

A new physical attack called TEE.fail has been released that compromises trusted execution environments (TEE) from Nvidia, AMD, and Intel. This low-cost, three-minute attack involves inserting a small hardware device between a memory chip and its motherboard slot after compromising the operating system kernel. Unlike previous attacks, TEE.fail works with DDR5 memory, affecting the latest TEE protections. Chipmakers exclude physical attacks from their threat models but often provide unclear statements about security assurances. Users frequently make incorrect or misleading claims about these protections, focusing on network edge server scenarios where physical access is a concern. Security researcher HD Moore notes that despite vulnerabilities, vendors continue to sell and users believe in the effectiveness of TEEs for such use cases.

Keywords

secure enclave 90% physical attacks 85% trusted execution environment (tee) 80% tee.fail attack 75% operating system kernel compromise 70% intel sgx/tdx 65% nvidia confidential compute 65% amd sev-snp 65% data protection 60% physical access threat 55%

Sentiment Analysis

Negative
Score: -0.40

Source Transparency

Source
Ars Technica
Political Lean
Center (-0.10)
Far LeftCenterFar Right
Classification Confidence
90%

This article was automatically classified using rule-based analysis. The political bias score ranges from -1 (far left) to +1 (far right).

Topic Connections

Explore how the topics in this article connect to other news stories

No topic relationship data available yet. This graph will appear once topic relationships have been computed.
Explore Full Topic Graph