Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Massive Android fraud operations are detected: iconade, kaleidoscope, malicious SMS software, NFC scams

July 3, 2025

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025

More than 40 malicious Firefox extensions target cryptocurrency wallets, steel assets

July 3, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » A new study shows that the latest AMD and Intel processors contain the Specter vulnerability
Global Security

A new study shows that the latest AMD and Intel processors contain the Specter vulnerability

AdminBy AdminOctober 29, 2024No Comments4 Mins Read
Spectre Vulnerability
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


October 29, 2024Ravi LakshmananHardware Security / Vulnerability

Specter vulnerability

More than six years later Specter security issue impact on today’s CPU processors has been revealed, a new study has shown that the latest AMD and Intel processors are still susceptible to speculative execution attacks.

attack opened by ETH Zürich researchers Johannes Wikner and Kave Razavi aims to break down the barrier of an indirect predictor of industries (IBPB) on x86 chips, an important countermeasure against speculative execution attacks.

Speculative performance refers to a performance optimization feature however, modern processors execute certain instructions out of order, predicting program branching in advance, thus speeding up the task if the value used speculatively was correct.

If this results in a false prediction, the instructions, called transients, are invalidated and suppressed before the processor can resume execution with the correct value.

Cyber ​​security

Although the execution results of transient instructions are unrelated to the architectural state of the program, they can still load certain sensitive data into the CPU cache through forced misprediction, thereby exposing it to a malicious adversary that would otherwise be blocked from accessing it to them. .

Intel describes IBPB as “a branch indirection control mechanism that establishes a barrier preventing software that was executing before the barrier from controlling the predicted targets of indirections that execute after the barrier on the same logical processor”.

It is used as a way to counter Branch Target injection (BTI), also known as Specter v2 (CVE-2017-5715), is a cross-domain transient execution attack (TEA) that exploits indirect branch predictors used by processors to cause disclosure gadget be speculatively executed.

A disclosure gadget refers to an attacker’s ability to access a victim’s secret that is otherwise architecturally invisible and obtain it through a covert channel.

Recent findings from ETH Zürich show that a microcode bug in Intel microarchitectures such as Golden Cove and Raptor Cove can be used to bypass IBPB. The attack was described as the first practical “end-to-end Spectre cross-process leak”.

The microcode flaw “preserves branch predictions in such a way that they can still be used after IBPB should have invalidated them,” the researchers said. “Such post-barrier speculation allows an attacker to bypass the security boundaries set by process contexts and virtual machines.”

Research has shown that AMD’s IBPB variant can be bypassed in the same way due to the way IBPB is applied by the Linux kernel, resulting in an attack codenamed Post-Barrier The beginning (aka PB-Inception) – This allows an unprivileged adversary to leak privileged memory on AMD Zen 1(+) and Zen 2 processors.

Intel has made available a microcode patch refer to problem (CVE-2023-38575, CVSS score: 5.5). AMD, for its part, is tracking the vulnerability as CVE-2022-23824, according to advisory released in November 2022.

“Intel users should make sure their intel microcode is updated,” the researchers said. “AMD users should be sure to install kernel updates.”

The disclosure comes months after ETH Zürich researchers detailed new attack methods codenamed RowHammer ZenHammer and SpyHammer, the latter of which uses RowHammer to determine DRAM temperatures with high accuracy.

Cyber ​​security

“The RowHammer is very sensitive to temperature changes, even if they are very small (eg ±1 °C),” the study says. said. “The percentage of bit errors caused by RowHammer constantly increases (or decreases) as temperature increases, and some DRAM cells vulnerable to RowHammer only detect bit errors at a certain temperature.”

Using the correlation between RowHammer and temperature, an attacker can determine computer system usage and measure ambient temperature. The attack could also compromise privacy by using temperature measurements to determine a person’s home habits and when they enter and leave a room.

“SpyHammer is a simple and effective attack that can spy on the temperature of critical systems without modification or prior knowledge of the victim system,” the researchers noted.

“SpyHammer could be a potential threat to the security and privacy of systems until a definitive and fully secure RowHammer defense mechanism is adopted, which is a big problem given that the RowHammer vulnerability continues to worsen as the technology scales.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Massive Android fraud operations are detected: iconade, kaleidoscope, malicious SMS software, NFC scams

July 3, 2025

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025

More than 40 malicious Firefox extensions target cryptocurrency wallets, steel assets

July 3, 2025

CISCO’s critical vulnerability in uniform grants on root access to static credentials

July 3, 2025

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Massive Android fraud operations are detected: iconade, kaleidoscope, malicious SMS software, NFC scams

July 3, 2025

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025

More than 40 malicious Firefox extensions target cryptocurrency wallets, steel assets

July 3, 2025

CISCO’s critical vulnerability in uniform grants on root access to static credentials

July 3, 2025

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025

This network traffic looks legal but it can hide a serious threat

July 2, 2025

US Sanctions of Russia

July 2, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Massive Android fraud operations are detected: iconade, kaleidoscope, malicious SMS software, NFC scams

July 3, 2025

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025

More than 40 malicious Firefox extensions target cryptocurrency wallets, steel assets

July 3, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.