PortSmash - New vulnerability on multi-threaded CPU
PortSmash is a dangerous side channel vulnerability, exploiting active streams simultaneously to steal the key and determine what the processor is doing. Currently, this vulnerability has been confirmed on the Kaby Lake and Skylake chiP but it is also possible to work on AMD's ultra-high-end processors.
SMT (Simultaneous multi-threading) creates two logical cores on each physical core, but these two cores can see what the other thread is doing.
Malware exploiting the PortSmash vulnerability will operate on a parallel logical core to target the target process and legitimize it. It will then record all data leaking from the legal process - usually the operating time - and then reconstruct what the other core is doing. It is supposed to steal a lot of information, most effectively evaluating cryptographic keys because of how the processor calculates them.
A similar flaw using SMT as a weakness is TLBleed, announced in June. It can identify a 356-bit encryption key for more than 17 seconds, using only 2 milliseconds of data. PortSmash may (or may not) be slower, but the possibility is that it will be more flexible.
'PortSmash is very flexible and there are few prerequisites, it does not need to know about cache connections (connecting from main memory to cache), machine learning techniques or reverse engineering. PortSmash also doesn't need root access, 'said Billy Bob Brumley, a researcher with PortSmash.
Brumley and his team consisted of four other researchers from universities in Cuba and Finland saying that the server architecture would be most affected. 'I think remote login scenarios are the biggest threat.' For example, when malicious users log into the website, they can use PortSmash to discover the encryption key used by the website and then hack the server to steal the data.
PortSmash can steal encryption keys
However, there is no need to panic. OpenSSL, a widely used encrypted library on the Internet (more than 60%) has just released a patch to prevent access via this direct method. They also said the general patch will soon be released, but security researchers say the hardware or BIOS also needs to take action.
They announced the vulnerability to Intel on October 1, but Intel did not agree, saying that encrypted libraries such as OpenSSL must prevent these security flaws themselves. AMD is considering its role in this regard.
On GitHub, there is also PoC if you want to try using PortSmash, it can steal the private key P-384 OpenSSL from TLS server running OpenSSl software which has not been upgraded to version 1.1.1
See more:
- Updating Windows 10 in the future will help the machine run faster by patching Specter
- Foreshadow - the fifth most serious security hole in the CPU in 2018
- Serious security vulnerability on Intel chips
You should read it
- AMD CPUs also have security vulnerabilities that have existed for many years now!
- New zero-day vulnerability warning in Windows Search, Windows protocol nightmare getting worse
- Apple releases iOS 14.4.2, iOS 12.5.2, and watchOS 7.3.3 updates that patch the critical zero-day vulnerability
- Microsoft urgently patched zero-day vulnerability after 2 years of refusing to acknowledge it
- Critical Vulnerability Discovered in 3 WordPress Plugins, Affects 84,000 Websites
- Discovered a new zero-day vulnerability on macOS that allows attackers to run commands remotely
- Detecting zero-day vulnerability in the Dropbox 10 Windows app, users pay attention!
- Detected a serious BIOS vulnerability, affecting many Intel processors
- 'Printer Catastrophe' Vulnerability Threatens All Versions of Windows
- Detecting a new Linux vulnerability allows hackers to gain control of the VPN connection
- Network security guide before vulnerability 196
- Detects a vulnerability that threatens all Windows computers shipped from 2012 up to now
May be interested
The newer the phone, the weaker the battery
8 reasons for the collapse of the Yahoo empire
Show off baseball tickets to buy 15 million on Instagram, young people 'give' tickets to bad guys without knowing
Invite to experience Samsung Experience 10 interface on Galaxy S9 +
Huawei Mate 20 Pro, Galaxy Note 9 and iPhone Xs Max pitted
Super secure SIM card, only connecting data via Tor anonymity network helps protect information for users