Geeks for your information
Intel's Cascade Lake CPUs impacted by new Zombieload v2 attack - Printable Version

+- Geeks for your information (https://www.geeks.fyi)
+-- Forum: News (https://www.geeks.fyi/forumdisplay.php?fid=105)
+--- Forum: Privacy & Security News (https://www.geeks.fyi/forumdisplay.php?fid=107)
+--- Thread: Intel's Cascade Lake CPUs impacted by new Zombieload v2 attack (/showthread.php?tid=9102)



Newer Intel CPUs Vulnerable to Variant 2 of ZombieLoad Attack - silversurfer - 13 November 19

Quote:Researchers have disclosed a new variant of the attack method dubbed ZombieLoad, which appears to also impact Intel CPUs that are not affected by the first variant of ZombieLoad.
 
In May, a team of researchers, including experts who brought to light the existence of speculative execution side-channel vulnerabilities such as Meltdown and Spectre, disclosed several new flaws affecting Intel processors. These new attack methods rely on Microarchitectural Data Sampling (MDS) vulnerabilities and they have been dubbed ZombieLoad, RIDL and Fallout.
 
The MDS vulnerabilities can be exploited by a malicious application to obtain potentially sensitive information from other apps, the operating system, and virtual machines. The attacks work against both PCs and cloud environments, and they can be leveraged to obtain information such as passwords, website content, disk encryption keys and browser history.
 
When they first disclosed the MDS vulnerabilities, researchers said they impacted most Intel CPUs made in the past decade, but they did not affect some of the newer processors. However, the same researchers revealed on Tuesday that they have also uncovered a second variant of the ZombieLoad attack, which works against CPUs that include hardware mitigations against MDS attacks.
 
According to the experts, ZombieLoad Variant 2 also works against Intel Xeon Gold server processors with Cascade Lake microarchitecture and Core i9 processors with Coffee Lake microarchitecture.
ZombieLoad Variant 2, tracked as CVE-2019-11135, is related to Intel’s Transactional Synchronization Extensions (TSX), which is designed to improve performance for multi-threaded software. ZombieLoad Variant 2, which Intel has described as a Transactional Asynchronous Abort (TAA) vulnerability, affects all CPUs that support TSX and have the TAA_NO bit set to 0.

Read more: https://www.securityweek.com/newer-intel-cpus-vulnerable-variant-2-zombieload-attack