Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025

Deployment of AI agents? Learn to provide them before the hackers have contributed to your business

May 9, 2025

Initial Access brokers

May 9, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » New T-Head CPU bugs expose devices to unlimited attacks
Global Security

New T-Head CPU bugs expose devices to unlimited attacks

AdminBy AdminAugust 13, 2024No Comments4 Mins Read
CPU Bugs
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


August 13, 2024Ravi LakshmananVulnerability / hardware security

Processor errors

A team of researchers from CISPA’s Helmholtz Center for Information Security in Germany discovered an architectural flaw in the XuanTie C910 and C920 of the Chinese company T-Head. RISC-V CPU which could allow attackers to gain unrestricted access to sensitive devices.

The vulnerability was codenamed GhostWrite. This was described as a direct processor bug built into the hardware, as opposed to a side-channel attack or transient execution.

“This vulnerability allows an unprivileged attacker, even with limited access, to read and write any part of a computer’s memory and control peripheral devices such as network cards,” the researchers said. said. “GhostWrite renders the CPU’s security features ineffective and cannot be fixed without disabling about half of the CPU’s features.”

CISPA found that the processor had faulty instructions in vector extension, an add-on to the RISC-V ISA designed to handle larger data values ​​than the base instruction set architecture (ISA).

These faulty instructions, which the researchers say work directly on physical memory rather than virtual memory, can bypass the process isolation normally performed by the operating system and hardware.

Cyber ​​security

As a result, an unprivileged attacker could use this vulnerability to write to any memory location and bypass security and isolation features to gain full, unrestricted access to the device. It can also leak any memory contents from the machine, including passwords.

“The attack is 100% robust, deterministic and takes only microseconds to execute,” the researchers said. “Not even security measures like Docker containerization or sandboxing can stop this attack. Additionally, an attacker can hijack hardware devices that use memory-mapped input/output (MMIO), allowing them to send any commands to those devices.”

The most effective countermeasure for GhostWrite is to disable all vector functionality, which, however, greatly affects performance and CPU capabilities as it disables approximately 50% of the instruction set.

“Fortunately, the vulnerable instructions reside in a vector extension that can be disabled by the operating system,” the researchers noted. “This completely mitigates GhostWrite, but also completely disables vectored instructions on the CPU.”

“Disabling vector expansion significantly reduces CPU performance, especially for tasks that benefit from parallel processing and handling large data sets. Applications that rely heavily on these features may experience lower performance or reduced functionality.”

The disclosure comes from the Android Red Team at Google revealed over nine vulnerabilities in Qualcomm’s Adreno GPU that could allow an attacker with local access to the device to achieve privilege escalation and kernel-level code execution. The flaws have since been fixed by the chipset manufacturer.

It is also worth discovering new things security flaw in AMD processors which could potentially be used by an attacker with access to the kernel (aka Ring-0) to elevate privileges and change the system management mode configuration (SMM or Ring-2) even if SMM lock is enabled.

Cyber ​​security

Duplicated The sink is close IOActive (aka CVE-2023-31315, CVSS score: 7.5), vulnerability remained unnoticed for nearly two decades. Access to the highest levels of privilege on a computer means it can disable security features and install persistent malware that can fly virtually under the radar.

Speaking to WIRED said the only way to cure the infection would be to physically connect to the CPUs with a hardware tool known as SPI Flash programmer and scan the memory for malware installed with SinkClose.

“A faulty check in the model-specific register (MSR) could allow a malicious program with ring0 access to modify the SMM configuration when SMI locking is enabled, potentially leading to arbitrary code execution” – AMD noted in an advisory that says it intends to release updates to original equipment manufacturers (OEMs) to mitigate the problem.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025

Deployment of AI agents? Learn to provide them before the hackers have contributed to your business

May 9, 2025

Initial Access brokers

May 9, 2025

Google unfolds on the AI ​​Defense device to detect scam in Chrome and Android

May 9, 2025

Chinese hackers operate SAP RCE LINK

May 9, 2025

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025

Deployment of AI agents? Learn to provide them before the hackers have contributed to your business

May 9, 2025

Initial Access brokers

May 9, 2025

Google unfolds on the AI ​​Defense device to detect scam in Chrome and Android

May 9, 2025

Chinese hackers operate SAP RCE LINK

May 9, 2025

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025

Deployment of AI agents? Learn to provide them before the hackers have contributed to your business

May 9, 2025

Initial Access brokers

May 9, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.