BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

Three PCIe IDE Vulnerabilities Expose Hardware Security Risks

PCIe IDE Protocol Flaws in PCIe 5.0 Expose Intel and AMD Processors to Low-Severity Attacks Requiring Physical Access, Prompting Firmware Updates

  • Three security flaws have been found in the PCIe Integrity and Data Encryption (IDE) protocol, starting with PCIe 5.0.
  • The flaws could lead to information leaks, privilege escalation, or denial of service if exploited.
  • Successful attacks require physical or low-level access to the PCIe IDE interface, making the vulnerabilities low severity.
  • Manufacturers are advised to update firmware following the PCIe 6.0 standard and Erratum #1 guidance to fix these issues.
  • The affected products include Intel Xeon processors with P-cores and AMD EPYC 9005 series processors.

Three security vulnerabilities have been identified in the Peripheral Component Interconnect Express (PCIe) Integrity and Data Encryption (IDE) protocol, impacting the PCIe Base Specification Revision 5.0 and newer. The PCI Special Interest Group (PCI-SIG) confirmed these flaws could expose local attackers to significant risks in devices using this protocol, which was introduced to protect data via encryption and integrity measures as part of PCIe 6.0. For more information on the IDE protocol, see IDE specification.

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading

PCIe is a high-speed interface standard widely used to connect hardware components such as graphics cards, Wi-Fi, Ethernet adapters, and storage devices within computing systems. The IDE mechanism aims to enhance security for data transmissions between these components. According to the PCI-SIG statement, exploitation of these vulnerabilities could result in information disclosure, higher privileges for attackers, or denial of service conditions.

The three identified vulnerabilities, discovered by Intel researchers Arie Aharon, Makaram Raghunandan, Scott Constable, and Shalini Sharma, include the following:

  • CVE-2025-9612: Forbidden IDE Reordering — a missing integrity check that may enable reordering of PCIe traffic, causing the receiver to process outdated data.

  • CVE-2025-9613: Completion Timeout Redirection — incomplete flushing of completion timeout could allow acceptance of incorrect data through injected packets with matching tags.

    - Advertisement -
  • CVE-2025-9614: Delayed Posted Redirection — incomplete flushing or re-keying of an IDE stream might cause consumption of stale or incorrect data packets.

PCI-SIG noted that exploiting these weaknesses threatens the confidentiality, integrity, and security goals of IDE. However, attacks require physical or low-level access to the target device’s PCIe IDE interface, which limits severity ratings to a CVSS v3.1 score of 3.0 and a CVSS v4 score of 1.8. Furthermore, the vulnerabilities may allow attackers to compromise isolation between trusted execution environments, affecting systems utilizing IDE and the Trusted Domain Interface Security Protocol (TDISP).

The CERT Coordination Center (CERT/CC) issued an advisory recommending that manufacturers adhere to the updated PCIe 6.0 requirement and apply Erratum #1 guidelines to their IDE implementations. Both Intel and AMD have released security alerts indicating affected hardware:

  • Intel Xeon 6 Processors with P-cores
  • Intel Xeon 6700P-B/6500P-B series SoC with P-Cores
  • AMD EPYC 9005 Series Processors
  • AMD EPYC Embedded 9005 Series Processors

Users should install firmware updates from system or component manufacturers, especially when operating environments depend on IDE for protecting sensitive information. For additional details, see the CERT advisory, Intel’s alert, and AMD’s bulletin.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

$35M in Bitcoin seized after police crack lost wallet

Irish police, with Europol's help, have seized 500 Bitcoin (worth over $35 million) from...

Gold Crashes to 4-Month Low; Strategists Keep $5K–$6.3K Targets

Gold crashed to a four-month low of $4,098, posting its worst five-session performance since...

Baltimore sues xAI over Grok’s millions of non-consensual deepfakes

The Mayor and City Council of Baltimore have sued X Corp., xAI, and SpaceX,...

SpaceX Targets Historic $75B IPO Filing This Week

SpaceX may file for its record-breaking IPO as soon as this week, targeting a...

Ethereum Aims for Quantum Resistance by 2029

The Ethereum Foundation has launched a "Post-Quantum Ethereum" resource hub to address future quantum...

Must Read

The 10 Best Crypto Podcasts You Can’t Miss

Table of ContentsBest Cryptocurrency Podcasts To Add To Your Playing List1. The Money Movement2. The Crypto Conversation3. The Pomp Podcast4. What Bitcoin Did5. The...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading