DEV Community

Cover image for ⚙️ New TEE vulnerabilities what’s up and who’s affected
Aditya Singh
Aditya Singh

Posted on

⚙️ New TEE vulnerabilities what’s up and who’s affected

So some new hardware-level vulnerabilities just dropped for TEEs (Trusted Execution Environments) the same tech a lot of “confidential computing” and privacy-chains rely on.

They’re called Battering RAM and Wiretap, and they basically let attackers extract encryption keys or snoop on supposedly “sealed” data if they have physical access to the machine.

🧩 The bigger picture
This kind of stuff shows how fragile hardware trust can be. TEEs are awesome for privacy-preserving computation, but they’re not magic they still run on real CPUs that can have side-channel leaks or memory encryption flaws.

It’s a good reminder that “confidential smart contracts” aren’t bulletproof by default. You always need other security layers: staking, governance, encrypted communications, dynamic CPU lists, etc.

💡 Oasis’ take on it

Oasis Protocol published a post explaining why their network wasn’t affected by these particular attacks mainly because they use older SGX hardware not vulnerable to the exploit, and they’ve built extra fail-safes in case a TEE is compromised.

Still, their blog is a solid read for anyone building on privacy tech and wanting to understand how to handle hardware vulnerabilities in production systems.

🔗 Read the post

tl;dr:

TEE ≠ invincible. Hardware bugs happen.
But good design = assuming they will happen and building backup defenses before they do.

Top comments (4)

Collapse
 
caerlower profile image
Manav

TEE flaws are a hardware reality. The projects that survive are the ones that built security outside of the enclave too. Good read on the defense in depth model.

Collapse
 
adityasingh2824 profile image
Aditya Singh

Yessssss, TEEs are powerful, but relying solely on hardware security is risky. That’s why defense-in-depth—combining enclave protections with cryptographic proofs, redundancy, and network-level safeguards is key. Oasis’ approach of layering fail-safes and using resilient SGX hardware is a great example of designing for real-world threats.

Collapse
 
savvysid profile image
sid

Exactly!! this is the reality check the space needed. TEEs aren’t magic shields; they’re just one layer of a much bigger security stack. What stood out in Oasis’ response is how they’ve already baked in redundancy, older unaffected SGX versions, enclave rotation, and attestation-based recovery paths. It’s a masterclass in assuming failure by design.

Some comments may only be visible to logged-in visitors. Sign in to view all comments.