Новости компьютерной безопасности:

  Latest News

New Vulnerability Affects All Intel Processors From The Last 6 Years

С сайта: Vulnerability(cybersecuritynews.com)

New Vulnerability Affects All Intel Processors From The Last 6 Years

Author: Guru Baran

A newly discovered class of vulnerabilities in Intel processors, termed Branch Predictor Race Conditions (BPRC), allows attackers to systematically extract sensitive data from the cache and random-access memory (RAM) of other users sharing the same hardware.

Affecting all Intel processors released in the past six years-including those in consumer devices and cloud server infrastructure-the vulnerability exploits speculative execution technologies designed to accelerate computational performance.

Researchers from ETH Zurich’s Computer Security Group (COMSEC) demonstrated that malicious actors could leverage BPRC to bypass privilege barriers at the processor level, achieving unauthorized readouts of memory contents at rates exceeding 5,000 bytes per second.

This flaw poses acute risks for multi-tenant cloud environments, where shared hardware resources amplify the potential for cross-user data breaches.

Speculative Execution and Its Inherent Security Trade-Offs
Modern processors employ speculative execution to predict and precompute likely instructions, reducing latency in program execution.

ETH Zurich’s Kaveh Razavi, head of COMSEC, notes that speculative technologies “fundamentally undermine data security” by introducing temporal gaps in privilege checks during user context switches.

The BPRC vulnerability follows a pattern seen in earlier flaws like Spectre (2017), Meltdown (2017), and Retbleed (2022), all of which manipulated speculative execution to access protected memory regions. These recurring issues highlight systemic weaknesses in how CPU architectures balance speed and security.

The BPRC vulnerability emerged from investigations into residual effects of the Retbleed patch. Johannes Wikner, a former PhD student in Razavi’s group, detected anomalous cache signals persisting regardless of Intel’s mitigation measures for Retbleed.

Sandro Rüegge, lead analyst for the BPRC research, traced these signals to a nanosecond-scale race condition occurring during privilege transitions.

When a processor switches between users or processes, it temporarily suspends speculative execution to update privilege permissions. However, BPRC exposes a critical flaw: permission updates lag behind speculative instruction precomputation by a few nanoseconds.

Attackers can inject code that triggers speculative execution during this window, causing the CPU to erroneously apply stale privileges. This allows unauthorized access to memory regions reserved for higher-privileged users or processes.

cyber security newsAttack Process
Cloud service providers face heightened risks due to their reliance on shared hardware. Virtual machines (VMs) or containers running on the same physical server often share CPU resources, creating opportunities for cross-tenant attacks.

A malicious actor could deploy a compromised VM to harvest data from co-located VMs, bypassing virtualization-layer security measures.

Enterprise data centers and public cloud platforms using Intel’s affected Xeon processors are particularly vulnerable. Attack vectors extend beyond traditional servers to edge computing nodes and IoT devices, leveraging Intel’s Atom or Core series chips.

Intel released microcode updates in late 2024 to address BPRC, requiring deployment via BIOS or operating system patches.

However, Razavi emphasizes that such fixes are stopgaps: “The series of newly discovered vulnerabilities in speculative technologies indicates fundamental architectural flaws”.

Each patch introduces performance overheads, undermining the very speed advantages speculative execution aims to provide.

For users, installing the latest Windows, Linux, or firmware updates remains critical. Cloud providers must ensure hypervisors and host systems apply these patches promptly.

Yet, as with Spectre and Meltdown, complete mitigation may require hardware redesigns a prospect complicated by the industry’s reliance on legacy x86 architectures.

BPRC underscores the need for a paradigm shift in processor architecture. Academics and industry groups are exploring alternatives such as in-order execution, which sacrifices some performance for deterministic security, and hardware-enforced isolation mechanisms like Intel’s Software Guard Extensions (SGX). However, widespread adoption of such designs remains years away.

Until then, organizations must prioritize vulnerability monitoring and layered defenses. Regular audits of firmware and microcode, coupled with intrusion detection systems tuned to cache anomalies, can reduce exposure.

For high-risk environments, migrating critical workloads to non-Intel platforms, though impractical for many, may become necessary.

As Razavi concludes, “The arms race between performance optimization and security is escalating. Without architectural overhauls, we will continue battling speculative execution flaws one patch at a time”.



#Cyber_Security #Cyber_Security_News #Intel #Vulnerability #cyber_security #cyber_security_news

Оригинальная версия на сайте: New Vulnerability Affects All Intel Processors From The Last 6 Years
Вернуться к списку новостей К свежим новостям Здесь был google AdSense.
Вместо рекламы товаров началась политическая агитация.
Отключено до получения извинений.

Вернуться к списку новостей Здесь был google AdSense.
Вместо рекламы товаров началась политическая агитация.
Отключено до получения извинений.


Новости проекта CSN:

✉ CSN.net4me.net

Обновление сайта csn.net4me.net

Обновление сайта csn.net4me.net 💻
cyber security news
  • Физически мы переехали на новый сервер. Благодарим наших подписчиков и постоянных читателей за терпение и понимание.
  • Сайт csn.net4me.net полностью адаптирован для работы по шифрованному SSL соединению.
  • Изменен механизм обработки и отображения опасных и критических уязвимостей.

Благодарим что вы с нами.


#CSN_обновление_сайта
https://csn.net4me.net/cyber_security_8301.html

Дополнительный материал

О проекте CSN

Проект CSN.net4me.net родился 16 Марта 2018 года.
Проект находится в самом начале своего развития. Конечно оформление, наполнение будет меняться. Одно останется неизменным - самые свежие новости компьютерной и сетевой безопасности.

О проекте net4me

Проект net4me.net развивался как сборник готовых решений и документации по темам компьютерной безопасности, сетевых решений и СПО (в часности linux). Темпы развития IT отрасли оказались столь быстрыми, что некоторые знания, технологии и информация о них устаревали мгновенно. Тем не менее, некоторый материал net4me.net до сих пор востребован.

Об источниках

Новости берутся CSN из открытых и доступных каждому источников. Авторы проекта стараются подбирать авторитетные и проверенные источники. Но, тем не менее, не несут ответственности за содержимое новостей. В каждой новости указывается источник этой новости, её автор и ссылка на оригинал новости.

Информация

Если вы желаете чтобы новости вашего ресурса были размещены на сайте CSN, то свяжитесь с авторами проекта csn@net4me.net и предложите ссылку на rss или xml ленту новостей вашего ресурса. Любая предложенная информация будет рассмотрена редакцией.