Intel faces a new vulnerability called BranchScope
New researchers have discovered a new off-the-shelf attack technique called BranchScope that could affect all devices using Intel processors.
New researchers have discovered a new off-the-shelf attack technique called BranchScope that could affect all devices using Intel processors.
A group of researchers from William & Mary University, California Riverside University, Carnegie Mellon University in Qatar and Binghamton University discovered the BranchScope vulnerability. Like Meltdown and Specter attacks, BranchScope can be used by bad guys to gather sensitive information from microprocessor-containing processors.
Experts have successfully tested an attack on three Intel chips, Sandy Bridge, Haswell and Skylake. This shows that the BranchScope can still be exploited on machines that have installed recently released patches for both Specter and Meltdown attacks.
Similar to Specter One, BranchScope technology targets branch prediction mechanisms (BPUs) implemented by processors to improve the performance of chips.
In their report, these experts also offer countermeasures for software and hardware. Hopefully this patch will soon be released by Intel.
See more:
- Detecting vulnerabilities in the QR code reader tool of iOS 11 may trick users into accessing malicious websites
- New dangerous security vulnerabilities appear on iOS 11.2.6, can read messages without unlocking
- Microsoft rewards $ 250,000 for any talent that discovers the new Meltdown and Specter vulnerabilities
You should read it
- Intel's chip has eight new serious vulnerabilities
- New dangerous vulnerability in Intel CPU: Works like Specter and Meltdown, threatening all PCs and the cloud
- Intel released a new patch to fix the Specter and Meltdown vulnerabilities
- Intel will stop releasing patches for the Specter v2 security hole on some older CPUs
- The new vulnerability on Intel allows hackers to take control of your computer within 30 seconds
- Overview of vulnerabilities on Intel, AMD, ARM chips: Meltdown and Specter
- Origin of the name and logo of Meltdown and Specter - Melting and Ghosts
- PC with Skylake and Kaby Lake CPUs failed to restart automatically after installing Meltdown & Specter patch
- Specter V2 vulnerability re-appears to attack Intel, Arm CPUs, AMD chips are not affected
- Apple confirmed that all Mac and iOS devices are affected by Meltdown and Specter
- This is a way to protect Linux Mint from Meltdown and Specter
- Intel: After installing Specter / Meltdown vulnerability patch your computer will slow down to 10%