www.scworld.com Open in urlscan Pro
2606:4700:20::ac43:473c  Public Scan

Submitted URL: https://packetstormsecurity.com/news/view/36536/Intel-And-AMD-Chips-Still-Vulnerable-To-Spectre-Flaw.html
Effective URL: https://www.scworld.com/news/intel-and-amd-chips-still-vulnerable-to-spectre-flaw
Submission: On October 30 via manual from US — Scanned from DE

Form analysis 1 forms found in the DOM

<form class="w-100" scmag-registration="set">
  <div class="my-2 font-body"><label class="visually-hidden form-label" for="email">Business Email</label><input placeholder="Business Email*" required="" type="email" id="email" class="fs-7 text-black p-3 form-control" value=""></div>
  <div class="fs-9 my-4">
    <p>By clicking the Subscribe button below, you agree to SC Media <a class="text-underline" target="_blank" href="https://www.cyberriskalliance.com/terms-of-use">Terms of Use</a><span> and
      </span><a class="text-underline" target="_blank" href="https://www.cyberriskalliance.com/terms-of-use#privacy-policy">Privacy Policy</a>.</p>
  </div>
  <div class="row"><button type="submit" class="col-6 btn btn-primary">Subscribe</button></div>
</form>

Text Content

Log inRegister
CISO Stories
Topics
Topic Hubs
Events
Podcasts
Research
Recognition
About
Open Search Bar

ADVERTISEMENT




Vulnerability Management, Network Security, Patch/Configuration Management


INTEL AND AMD CHIPS STILL VULNERABLE TO SPECTRE FLAW

October 29, 2024
Share

By Steve Zurier

(Adobe Stock)

It's back — and it may have never left.

More than six years after the Spectre flaw affecting CPUs was first reported,
researchers learned that that Intel and AMD processors are still vulnerable to
speculative execution attacks.

In a study posted by ETH Zurich, a public research university in Switzerland,
the researchers said the attacks mainly seek to exploit the Indirect Branch
Predictor Barrier (IBPB) on x86 chips, a chip’s built-in security mechanisms for
warding off speculative execution attacks.

Modern CPUs depend on speculative execution to optimize a chip’s performance by
predicting the future path of code execution and executing certain instructions
ahead of time. If these predictions are correct, this "pre-execution" reduces
delays and speeds up system performance.

ADVERTISEMENT



The problem with Spectre speculative execution attacks: An attacker could
intentionally manipulate the speculative execution process to access data they
normally wouldn't be authorized to read.

“They might force a CPU to mispredict to gain access to cached information like
encryption keys or personal data from another process,” said Callie Guenther,
senior manager of cyber threat research at Critical Start. “This kind of attack
sidesteps traditional access controls by focusing on unintended
microarchitectural behavior, which is difficult to detect and prevent with
standard security checks."

The ETH Zurich researchers said these new issues were disclosed to Intel and AMD
in June 2024, and both companies confirmed their respective issues. Intel has
made a microcode patch available to address the issue, CVE-2023-38575. AMD has
been tracking the vulnerability for the past couple of years as CVE-2022-23824,
according to its advisory.

“Intel informed us that their issue, tracked under INTEL-SA-00982, had been
found internally and fixed in a microcode update,” wrote the ETH Zurich
researchers. “This microcode update was, however, not available in Ubuntu
repositories at the time of writing this paper. We are currently working with
the Linux kernel maintainers to merge our proposed software patch.”

John Gallagher, vice president of Viakoo Labs, said speculative execution has
been around for more than 20 years, and today all modern CPUs use this approach
— it significantly speeds up processing, even accounting for times it might get
the anticipated instructions wrong. Gallagher said if this approach was not
available, we would see a significant drop in CPU performances, thus creating a
giant business impact from slower processing. 

“Chip-level vulnerabilities are typically hard to patch,” said
Gallagher. “Organizations should have a ‘defense-in-depth’ approach to security,
where even if data is compromised from reading chip-level caches there would be
other ways to stop an attacker from using it. In addition, ensuring key systems
are on segmented networks is important to prevent lateral movement.” 

Guenther, an SC Media columnist, offered six tips for security teams to mitigate
against speculative execution attacks:

Stay updated on microcode patches: Intel and AMD regularly release microcode
updates that address known vulnerabilities. Security teams should ensure that
these updates are applied promptly to all affected hardware. Microcode updates
are crucial as they address vulnerabilities at the firmware level, reducing the
attack surface.

Enable speculative execution mitigations: Even though these mitigations may have
performance implications, such as IBPB, Single Thread Indirect Branch Predictors
(STIBP), and Retpoline, they are critical to reducing the risk posed by
speculative execution attacks. Understanding the trade-offs between performance
and security in your environment is key.

Leverage software-based defenses: Implement memory-safe programming techniques
and encourage the use of compiler-based mitigations like Control Flow Integrity
(CFI). These help in making exploitation of speculative execution more
difficult.

Monitor and isolate sensitive processes: Segment and limit high-privilege code
execution from lower-privilege processes. Ensure that sensitive applications or
services do not share CPU cores with potentially malicious or untrusted
workloads.

Implement rigorous access controls and sandboxing: Limit a user-level
application’s ability to execute untrusted code that might trigger speculative
execution bugs. In scenarios where untrusted code must be executed, consider
using isolated environments like containers or virtual machines.

Perform risk assessments: Regularly assess the impact of speculative execution
vulnerabilities in the context of the organization’s specific threat model. This
is especially crucial in shared environments like cloud infrastructure or
multi-tenant data centers.




AN IN-DEPTH GUIDE TO NETWORK SECURITY

Get essential knowledge and practical strategies to fortify your network
security.
Learn More
Steve Zurier


RELATED


Vulnerability Management

UNOFFICIAL FIXES ISSUED FOR WINDOWS THEMES ZERO-DAY

SC StaffOctober 30, 2024

ACROS Security has released free unofficial fixes for a zero-day flaw in Windows
Themes, which could be leveraged to facilitate the remote compromise of NTLM
credentials on devices running on Windows 7 to Windows 11 24H2.

Ransomware

THOUSANDS OF VULNERABLE CYBERPANEL INSTANCES TAKEN DOWN IN PSAUX RANSOMWARE
ATTACK

SC StaffOctober 30, 2024

Most of the vulnerable CyberPanel implementations, which could be taken over
using the security issue, were in the U.S., followed by Germany, Singapore,
Indonesia, and India, according to threat intelligence search engine LeakIX.

Managed Services

MODERNIZING YOUR SECURITY OPERATIONS: BRIDGING THE SKILLS GAP WITH MDR

Paul WagenseilOctober 30, 2024

Today's cybersecurity needs may be too demanding for a single team to handle.
Here's why even the largest enterprises can benefit from external managed
detection and response (MDR) services.


RELATED EVENTS

 * 
   Cybercast
   
   BALANCING ACT: PRIORITIZING VULNERABILITIES AND MISCONFIGURATIONS IN
   VULNERABILITY MANAGEMENT
   
   On-Demand Event

 * 
   Cybercast
   
   CISO PERSPECTIVES TO IMPROVE/OPTIMIZE VULNERABILITY MANAGEMENT
   
   On-Demand Event

 * 
   Cybercast
   
   EXPOSURE MANAGEMENT: HOW ORGANIZATIONS CAN USE IT TO BUILD CYBER RESILIENCE
   
   On-Demand Event

Related Terms

ACK PiggybackingBroadcast AddressCache PoisoningCall Admission Control
(CAC)CellCollisionCrossover CableDecapsulationDemilitarized Zone
(DMZ)Disassembly

ADVERTISEMENT




GET DAILY EMAIL UPDATES

SC Media's daily must-read of the most current and pressing daily news
Business Email

By clicking the Subscribe button below, you agree to SC Media Terms of Use and
Privacy Policy.

Subscribe






--------------------------------------------------------------------------------

ABOUT US

SC MediaCyberRisk AllianceContact UsCareersPrivacy

GET INVOLVED

SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us

EXPLORE

Product reviewsResearchWhite papersWebcastsPodcasts

Copyright © 2024 CyberRisk Alliance, LLC All Rights Reserved. This material may
not be published, broadcast, rewritten or redistributed in any form without
prior authorization.

Your use of this website constitutes acceptance of CyberRisk Alliance Privacy
Policy and Terms of Use.

COOKIES

This website uses cookies to improve your experience, provide social media
features and deliver advertising offers that are relevant to you.

If you continue without changing your settings, you consent to our use of
cookies in accordance with our privacy policy. You may disable cookies.

Accept cookies