Stories
Slash Boxes
Comments

SoylentNews is people

posted by Fnord666 on Wednesday January 29 2020, @10:25PM   Printer-friendly
from the cash-out dept.

New 'CacheOut' attack targets Intel processors, with a fix arriving soon

Researchers have discovered and published information on what they're calling CacheOut, a vulnerability in most Intel CPUs that allows an attacker to target more specific data, even stored within Intel's secured SGX enclave.

Intel assigned what's known as the CVE-2020-0549 vulnerability a threat level of "medium," acknowledging the danger of a targeted attack. The company noted that CacheOut has never been used outside of a laboratory environment.

Among the threats CacheOut poses is to cloud providers, and leaking data from hypervisors (virtual machine monitors) and the virtual machines running on them. Because the researchers disclosed the CacheOut vulnerability privately to Intel some time before making it public, those cloud providers have already deployed countermeasures against CacheOut.

Intel said that it plans to release mitigations to address the issue in the near future. These normally are sent to users in the form of BIOS or driver updates.

Virtually all Intel processors are potentially affected by CacheOut, save for processors released after the fourth quarter of 2019. AMD processors are not affected, according to details released on a dedicated CacheOut site. Processors made by IBM and ARM may be affected, but have not been confirmed. The paper, by lead author researcher Stephan van Schaik of the University of Michigan and colleagues, has also been made public.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2, Interesting) by Anonymous Coward on Thursday January 30 2020, @12:37AM

    by Anonymous Coward on Thursday January 30 2020, @12:37AM (#950923)

    finally the L1 exploits are starting to come out. The linked paper is very clear (if you're into this kinda thing) and sure enough it's straight up cache flush sequencing.

    Bonus - they can leak stack canaries!

    Starting Score:    0  points
    Moderation   +2  
       Interesting=2, Total=2
    Extra 'Interesting' Modifier   0  

    Total Score:   2