By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Three PCIe Encryption Weaknesses Expose PCIe 5.0+ Systems to Faulty Data Handling
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Three PCIe Encryption Weaknesses Expose PCIe 5.0+ Systems to Faulty Data Handling
Computing

Three PCIe Encryption Weaknesses Expose PCIe 5.0+ Systems to Faulty Data Handling

News Room
Last updated: 2025/12/10 at 10:09 AM
News Room Published 10 December 2025
Share
Three PCIe Encryption Weaknesses Expose PCIe 5.0+ Systems to Faulty Data Handling
SHARE

Dec 10, 2025Ravie LakshmananHardware Security / Vulnerability

Three security vulnerabilities have been disclosed in the Peripheral Component Interconnect Express (PCIe) Integrity and Data Encryption (IDE) protocol specification that could expose a local attacker to serious risks.

The flaws impact PCIe Base Specification Revision 5.0 and onwards in the protocol mechanism introduced by the IDE Engineering Change Notice (ECN), according to the PCI Special Interest Group (PCI-SIG).

“This could potentially result in security exposure, including but not limited to, one or more of the following with the affected PCIe component(s), depending on the implementation: (i) information disclosure, (ii) escalation of privilege, or (iii) denial of service,” the consortium noted.

PCIe is a widely used high-speed standard to connect hardware peripherals and components, including graphics cards, sound cards, Wi-Fi and Ethernet adapters, and storage devices, inside computers and servers. Introduced in PCIe 6.0, PCIe IDE is designed to secure data transfers through encryption and integrity protections.

Cybersecurity

The three IDE vulnerabilities, discovered by Intel employees Arie Aharon, Makaram Raghunandan, Scott Constable, and Shalini Sharma, are listed below –

  • CVE-2025-9612 (Forbidden IDE Reordering) – A missing integrity check on a receiving port may allow re-ordering of PCIe traffic, leading the receiver to process stale data.
  • CVE-2025-9613 (Completion Timeout Redirection) – Incomplete flushing of a completion timeout may allow a receiver to accept incorrect data when an attacker injects a packet with a matching tag.
  • CVE-2025-9614 (Delayed Posted Redirection) – Incomplete flushing or re-keying of an IDE stream may result in the receiver consuming stale, incorrect data packets.

PCI-SIG said that successful exploitation of the aforementioned vulnerabilities could undermine the confidentiality, integrity, and security objectives of IDE. However, the attacks hinge on obtaining physical or low-level access to the targeted computer’s PCIe IDE interface, making them low-severity bugs (CVSS v3.1 score: 3.0/CVSS v4 score: 1.8).

“All three vulnerabilities potentially expose systems implementing IDE and Trusted Domain Interface Security Protocol (TDISP) to an adversary that can breach isolation between trusted execution environments,” it said.

Cybersecurity

In an advisory released Tuesday, the CERT Coordination Center (CERT/CC) urged manufacturers to follow the updated PCIe 6.0 standard and apply the Erratum #1 guidance to their IDE implementations. Intel and AMD have published their own alerts, stating the issues impact the following products –

  • Intel Xeon 6 Processors with P-cores
  • Intel Xeon 6700P-B/6500P-B series SoC with P-Cores.
  • AMD EPYC 9005 Series Processors
  • AMD EPYC Embedded 9005 Series Processors

“End users should apply firmware updates provided by their system or component suppliers, especially in environments that rely on IDE to protect sensitive data,” it said.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article ‘It Was Nuts’: The Extreme Tests that Show Why Hail Is a Multibillion-Dollar Problem ‘It Was Nuts’: The Extreme Tests that Show Why Hail Is a Multibillion-Dollar Problem
Next Article Google Maps on iOS now remembers where you parked Google Maps on iOS now remembers where you parked
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

AI risks undermining the heart of higher education
AI risks undermining the heart of higher education
Software
Bolt Insight closes £7m round for its AI consumer intelligence platform – UKTN
Bolt Insight closes £7m round for its AI consumer intelligence platform – UKTN
News
The Screen Is the API | HackerNoon
The Screen Is the API | HackerNoon
Computing
AirPods Pro 3 vs AirPods Pro 2: Which should you get?
AirPods Pro 3 vs AirPods Pro 2: Which should you get?
Gadget

You Might also Like

The Screen Is the API | HackerNoon
Computing

The Screen Is the API | HackerNoon

11 Min Read
Amazon expands same-day service for perishable groceries, intensifying battle with Instacart
Computing

Amazon expands same-day service for perishable groceries, intensifying battle with Instacart

4 Min Read
Trump open to extending TikTok sale deadline · TechNode
Computing

Trump open to extending TikTok sale deadline · TechNode

1 Min Read
MTN South Africa to raise contract prices up by 5.4% in February
Computing

MTN South Africa to raise contract prices up by 5.4% in February

4 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?