Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Three PCIe Encryption Weaknesses Expose PCIe 5.0+ Systems to Faulty Data Handling

Posted on December 10, 2025December 11, 2025 By CWS

Dec 10, 2025Ravie LakshmananHardware Safety / Vulnerability
Three safety vulnerabilities have been disclosed within the Peripheral Element Interconnect Specific (PCIe) Integrity and Knowledge Encryption (IDE) protocol specification that might expose a neighborhood attacker to severe dangers.
The failings affect PCIe Base Specification Revision 5.0 and onwards within the protocol mechanism launched by the IDE Engineering Change Discover (ECN), in accordance with the PCI Particular Curiosity Group (PCI-SIG).
“This might doubtlessly lead to safety publicity, together with however not restricted to, a number of of the next with the affected PCIe part(s), relying on the implementation: (i) data disclosure, (ii) escalation of privilege, or (iii) denial of service,” the consortium famous.
PCIe is a extensively used high-speed customary to attach {hardware} peripherals and parts, together with graphics playing cards, sound playing cards, Wi-Fi and Ethernet adapters, and storage gadgets, inside computer systems and servers. Launched in PCIe 6.0, PCIe IDE is designed to safe information transfers by way of encryption and integrity protections.

The three IDE vulnerabilities, found by Intel staff Arie Aharon, Makaram Raghunandan, Scott Constable, and Shalini Sharma, are listed beneath –

CVE-2025-9612 (Forbidden IDE Reordering) – A lacking integrity verify on a receiving port might permit re-ordering of PCIe visitors, main the receiver to course of stale information.
CVE-2025-9613 (Completion Timeout Redirection) – Incomplete flushing of a completion timeout might permit a receiver to simply accept incorrect information when an attacker injects a packet with an identical tag.
CVE-2025-9614 (Delayed Posted Redirection) – Incomplete flushing or re-keying of an IDE stream might end result within the receiver consuming stale, incorrect information packets.

PCI-SIG stated that profitable exploitation of the aforementioned vulnerabilities might undermine the confidentiality, integrity, and safety targets of IDE. Nevertheless, the assaults hinge on acquiring bodily or low-level entry to the focused laptop’s PCIe IDE interface, making them low-severity bugs (CVSS v3.1 rating: 3.0/CVSS v4 rating: 1.8).
“All three vulnerabilities doubtlessly expose techniques implementing IDE and Trusted Area Interface Safety Protocol (TDISP) to an adversary that may breach isolation between trusted execution environments,” it stated.

In an advisory launched Tuesday, the CERT Coordination Middle (CERT/CC) urged producers to observe the up to date PCIe 6.0 customary and apply the Erratum #1 steering to their IDE implementations. Intel and AMD have printed their very own alerts, stating the problems affect the next merchandise –

Intel Xeon 6 Processors with P-cores
Intel Xeon 6700P-B/6500P-B collection SoC with P-Cores.
AMD EPYC 9005 Collection Processors
AMD EPYC Embedded 9005 Collection Processors

“Finish customers ought to apply firmware updates offered by their system or part suppliers, particularly in environments that depend on IDE to guard delicate information,” CERT/CC stated.

The Hacker News Tags:Data, Encryption, Expose, Faulty, Handling, PCIe, Systems, Weaknesses

Post navigation

Previous Post: Google Patches Gemini Enterprise Vulnerability Exposing Corporate Data 
Next Post: US Indicts Extradited Ukrainian on Charges of Aiding Russian Hacking Groups

Related Posts

Hackers Exploit Critical WordPress Theme Flaw to Hijack Sites via Remote Plugin Install The Hacker News
Pre-Auth Exploit Chains Found in Commvault Could Enable Remote Code Execution Attacks The Hacker News
UNC5221 Uses BRICKSTORM Backdoor to Infiltrate U.S. Legal and Technology Sectors The Hacker News
Chrome Extension Caught Injecting Hidden Solana Transfer Fees Into Raydium Swaps The Hacker News
SideWinder Adopts New ClickOnce-Based Attack Chain Targeting South Asian Diplomats The Hacker News
Discover and Control Shadow AI Agents in Your Enterprise Before Hackers Do The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Ashen Lepus Hacker Group Attacks Eastern Diplomatic Entities With New AshTag Malware
  • New React RSC Vulnerabilities Enable DoS and Source Code Exposure
  • $320,000 Paid Out at Zeroday.Cloud for Open Source Software Exploits
  • CISA Warns of OSGeo GeoServer 0-Day Vulnerability Exploited in Attacks
  • CISA Flags Actively Exploited GeoServer XXE Flaw in Updated KEV Catalog

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Ashen Lepus Hacker Group Attacks Eastern Diplomatic Entities With New AshTag Malware
  • New React RSC Vulnerabilities Enable DoS and Source Code Exposure
  • $320,000 Paid Out at Zeroday.Cloud for Open Source Software Exploits
  • CISA Warns of OSGeo GeoServer 0-Day Vulnerability Exploited in Attacks
  • CISA Flags Actively Exploited GeoServer XXE Flaw in Updated KEV Catalog

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark