VYPR
Medium severity4.1NVD Advisory· Published Feb 10, 2026· Updated Apr 15, 2026

CVE-2025-27572

CVE-2025-27572

Description

Exposure of sensitive information during transient execution for some TDX within Ring 0: Hypervisor may allow an information disclosure. Authorized adversary with a privileged user combined with a high complexity attack may enable data exposure. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (none) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CVE-2025-27572 is a transient execution information disclosure vulnerability in Intel TDX that allows a privileged local attacker with high complexity to leak sensitive data from the hypervisor.

Vulnerability

Overview CVE-2025-27572 describes an exposure of sensitive information during transient execution within Intel Trust Domain Extensions (TDX) at Ring 0 (hypervisor level). This is a side-channel vulnerability that arises from speculative or out-of-order execution, similar to other transient execution attacks. The flaw resides in the TDX module, which is responsible for isolating trusted domains from the host hypervisor.

Exploitation

Requirements Exploitation requires an authorized adversary with a privileged user account on the system, combined with a high-complexity attack. The attack is performed locally and does not require user interaction. The adversary must have special internal knowledge of the system to meet the attack prerequisites. The attack vector is local access, meaning the attacker must already have a foothold on the vulnerable platform.

Impact

Successful exploitation could lead to the disclosure of sensitive information from the hypervisor or other trusted domains, with a high confidentiality impact. Integrity and availability are not affected. The vulnerability does not allow the attacker to modify data or cause denial of service; it only enables information leakage.

Mitigation

Intel has released a security advisory (INTEL-SA-01397) [1] that provides firmware updates and guidance to mitigate this vulnerability. Users are advised to apply the latest TDX module updates from their platform vendor. No workarounds are mentioned, and the vulnerability is not listed on the CISA Known Exploited Vulnerabilities catalog as of publication.

References
  1. INTEL-SA-01397

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.