Stories
Slash Boxes
Comments

SoylentNews is people

posted by Fnord666 on Wednesday January 29 2020, @10:25PM   Printer-friendly
from the cash-out dept.

New 'CacheOut' attack targets Intel processors, with a fix arriving soon

Researchers have discovered and published information on what they're calling CacheOut, a vulnerability in most Intel CPUs that allows an attacker to target more specific data, even stored within Intel's secured SGX enclave.

Intel assigned what's known as the CVE-2020-0549 vulnerability a threat level of "medium," acknowledging the danger of a targeted attack. The company noted that CacheOut has never been used outside of a laboratory environment.

Among the threats CacheOut poses is to cloud providers, and leaking data from hypervisors (virtual machine monitors) and the virtual machines running on them. Because the researchers disclosed the CacheOut vulnerability privately to Intel some time before making it public, those cloud providers have already deployed countermeasures against CacheOut.

Intel said that it plans to release mitigations to address the issue in the near future. These normally are sent to users in the form of BIOS or driver updates.

Virtually all Intel processors are potentially affected by CacheOut, save for processors released after the fourth quarter of 2019. AMD processors are not affected, according to details released on a dedicated CacheOut site. Processors made by IBM and ARM may be affected, but have not been confirmed. The paper, by lead author researcher Stephan van Schaik of the University of Michigan and colleagues, has also been made public.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 0) by Anonymous Coward on Thursday January 30 2020, @10:02AM

    by Anonymous Coward on Thursday January 30 2020, @10:02AM (#951116)

    You can search Soylent. A couple of us specifically mentioned this domain (cache flushing bugs relying on sequencing or timing) when the earlier speculation bugs came out. It's been a known fertile area the whole time, just nobody had monetized it in the wild.

    If Soylentils knew you can be sure others have also stumbled upon, fuzzed, or analyzed for similar.