Skip to main content
Mallory

Linux Kernel Adds PCIe Link Encryption Amid Disclosure of PCIe IDE Vulnerabilities

cloud-service-vulnerabilitywidely-deployed-product-advisoryembedded-device-vulnerability
Updated March 21, 2026 at 03:10 PM3 sources
Share:
Linux Kernel Adds PCIe Link Encryption Amid Disclosure of PCIe IDE Vulnerabilities

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

The Linux kernel is introducing support for PCI Express (PCIe) Link Encryption in version 6.19, a feature developed collaboratively by Intel, AMD, and Arm to enhance the security of cloud server infrastructure. This new capability leverages certificates and keys to encrypt data transmitted between CPUs and hardware components over PCIe, aiming to prevent unauthorized devices from intercepting sensitive information. The encryption protocol, known as Integrity and Data Encryption (IDE), is managed through a Trusted Execution Environment (TEE) Security Manager, providing an additional layer of protection for cloud providers against hardware-based attacks.

Concurrently, three significant vulnerabilities have been disclosed in the PCIe IDE protocol, affecting PCIe Base Specification Revision 5.0 and later. These flaws—CVE-2025-9612, CVE-2025-9613, and CVE-2025-9614—could allow local attackers to reorder traffic, redirect completion timeouts, or inject stale data, potentially leading to information disclosure, privilege escalation, or denial of service. While these vulnerabilities require physical or low-level access to exploit, they highlight the ongoing challenges in securing PCIe communications, even as new encryption features are being integrated into major operating systems like Linux.

Timeline

  1. Dec 11, 2025

    PCI-SIG issues draft engineering change notice for future PCIe specs

    In response to the specification-level weaknesses, PCI-SIG released a Draft Engineering Change Notice to address the IDE issues in future PCIe specifications. Existing hardware was still expected to rely on firmware-based mitigations from vendors.

  2. Dec 10, 2025

    Linux announces PCI Express Link Encryption support for kernel 6.19

    The Linux kernel project announced support for PCI Express Link Encryption in version 6.19, a feature developed by Intel, AMD, and Arm to protect data between CPUs and PCIe devices. The design uses certificates and keys managed by a TEE Security Manager to authenticate devices and help prevent rogue hardware from intercepting PCIe traffic.

  3. Dec 10, 2025

    Intel and AMD publish advisories and urge firmware updates

    Following disclosure, Intel and AMD issued advisories for affected products and told customers to install vendor firmware updates. The guidance focused on reducing risk in sensitive environments such as servers, data centers, and trusted execution deployments.

  4. Dec 10, 2025

    PCI-SIG and CERT/CC disclose PCIe IDE flaws and recommend mitigations

    The three PCIe IDE vulnerabilities were publicly disclosed with guidance from PCI-SIG and CERT/CC. They recommended updating to the latest PCIe 6.0 standard and applying relevant errata, while noting the flaws require local or physical access rather than remote exploitation.

  5. Dec 10, 2025

    Intel researchers discover three PCIe IDE vulnerabilities

    Intel researchers identified three flaws in the PCIe Integrity and Data Encryption protocol, later tracked as CVE-2025-9612, CVE-2025-9613, and CVE-2025-9614. The issues affect PCIe Base Specification 5.0 and later and could let attackers with physical or low-level access compromise confidentiality, integrity, or availability.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Stories

Linux Kernel Research Highlights x86 Page-Fault Interrupt Handling Bug and Faster Page-Cache Side-Channel Attacks

Linux Kernel Research Highlights x86 Page-Fault Interrupt Handling Bug and Faster Page-Cache Side-Channel Attacks

Linux kernel security reporting highlighted two separate Linux-focused issues: a long-standing **x86 page-fault handling** logic flaw and newly optimized **page-cache side-channel** techniques. An Intel engineer (Cedric Xing) identified that, since 2020, parts of the x86 `do_page_fault()` path could leave **hardware interrupts** enabled in situations where the kernel’s logic assumed they were disabled, due to conflating address range (user vs. kernel) with execution context; a fix was merged into **Linux 6.19** with plans to backport to stable branches. Separately, researchers from Graz University of Technology described significantly faster Linux **page cache attacks**, reducing cache-flush time from ~149 ms to ~0.8 µs and enabling tighter attack loops (0.6–2.3 µs). The work describes potential impacts including more precise overlay/keylogging-style attacks, inter-keystroke timing inference, container/Docker file-activity insights, and user-activity inference in applications such as Discord and Firefox; reporting noted that only **CVE-2025-21691** has been remediated by the Linux kernel security team. A third item—Imagination Technologies’ GPU driver vulnerability bulletin—covers unrelated **GPU DDK** issues (information leak and UAF-class bugs) and does not pertain to the Linux kernel x86/page-cache topics.

1 months ago
TEE.Fail Side-Channel Attack Compromises Confidential Computing on DDR5 Systems

TEE.Fail Side-Channel Attack Compromises Confidential Computing on DDR5 Systems

Academic researchers from Georgia Tech, Purdue University, and Synkhronix have developed a side-channel attack named **TEE.Fail** that enables the extraction of secrets from trusted execution environments (TEEs) in modern CPUs, including Intel's SGX and TDX, AMD's SEV-SNP, and even Nvidia's GPU Confidential Computing. The attack leverages a memory-bus interposition technique on DDR5 systems, using off-the-shelf equipment costing under $1,000, to physically intercept and analyze encrypted memory traffic. This method allows attackers with physical access and root privileges to extract cryptographic keys and forge attestation, undermining the security guarantees of confidential computing environments. TEE.Fail is the first attack demonstrated against DDR5-based TEEs, extending previous DDR4-focused research such as WireTap and BatteringRAM. The researchers found that architectural changes in recent server-grade CPUs, specifically the adoption of deterministic AES-XTS encryption without memory integrity and replay protections, have introduced exploitable weaknesses. The attack's success highlights significant risks for organizations relying on hardware-based confidential computing, as it enables the compromise of sensitive data and secure workloads even on fully updated, trusted systems.

1 months ago
Microsoft Discloses Linux Kernel Flaws in TEQL and USB CAN Drivers

Microsoft Discloses Linux Kernel Flaws in TEQL and USB CAN Drivers

Microsoft published security advisories for two Linux kernel vulnerabilities tracked as **`CVE-2026-23277`** and **`CVE-2026-23334`**. The first issue affects the networking stack, where **`net/sched: teql`** received a fix for a **NULL pointer dereference** in **`iptunnel_xmit`** during TEQL slave transmission, indicating a kernel-level flaw that could lead to instability or denial-of-service conditions. A second advisory, **`CVE-2026-23334`**, affects the CAN USB driver path, with a fix in **`can: usb: f81604`** to properly handle **short interrupt URB messages**. Together, the disclosures highlight separate low-level Linux kernel defects in networking and device-driver components that require patching through vendor security updates.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.

Linux Kernel Adds PCIe Link Encryption Amid Disclosure of PCIe IDE Vulnerabilities | Mallory