Intel and Google published the results of a significant joint security review of Intel Trust Domain Extensions (Intel TDX). The five-month engagement between Intel’s INT31 research team and Google Cloud Security focused on hardening Intel TDX Module 1.5, the core software responsible for managing confidential virtual machines. The review identified five vulnerabilities and 35 other weaknesses or areas for improvement. According to Intel, all five vulnerabilities were patched in the latest code version released to partners.

Intel TDX represents a shift in data center security. Unlike traditional virtualization, where the hypervisor has full access to guest data, TDX creates “Trust Domains” (TDs), or hardware-isolated virtual machines. These are cryptographically isolated from the hosting infrastructure using Intel’s Secure Arbitration Mode (SEAM). The system relies on the Intel TDX Module, a digitally signed software shim running in SEAM. It enforces security policies that hardware alone cannot handle. Because a compromise of this module could theoretically bypass the system’s isolation guarantees, it is a critical verification target.

The joint review specifically targeted complex features introduced in TDX Module 1.5: Live Migration and TD Partitioning. Live Migration involves moving an encrypted VM between physical servers without interrupting operation or exposing keys to the untrusted hypervisor. TD Partitioning allows for nested virtual machines within a Trust Domain, adding layers of abstraction that require rigorous checking. Google’s team employed a hybrid approach to audit these features, combining manual code review and custom bug-finding tools with AI analysis using Gemini Pro to flag logical flaws.

This partnership highlights the industry trend of “co-validation.” As foundational technologies become the bedrock of global cloud infrastructure, vendors are increasingly inviting major partners to audit code before widespread deployment. “No product can be absolutely secure,” Intel stated regarding the report. “The more eyes that look at a product, the stronger it will be.” For enterprise customers, this review offers higher assurance that the hardware root of trust is being actively interrogated by independent parties, ensuring the technology is battle-tested before it scales to support billions of users.