Specter V2 vulnerability re-appears to attack Intel, Arm CPUs, AMD chips are not affected
The vulnerability affects all Intel processor models released in the past few years, along with certain Arm processor cores. The specific list of affected products is unknown, but will certainly include Intel's newly-launched 12th Gen Alder Lake CPU family. Surprisingly, AMD chips don't seem to be affected by this vulnerability, at least for now.
BHI is essentially a proof-of-concept attack that affects CPUs that are already vulnerable to Specter V2 exploits, but with all mitigations in place. As reported by Phoronix experts, this new mining method can bypass Intel's eIBRS and Arm's CSV2. BHI re-enables cross-privileged Specter-v2 mining, enabling kernel-to-kernel (aka BTI in internal mode) mining and paving the way for malicious actors to inject prediction entries into History Injection to leak kernel data. As a result, arbitrary kernel memory on targeted CPUs could leak, potentially revealing confidential information, including passwords.
To prove their claims, the researchers also released a proof of concept (PoC) document, which shows the state of an arbitrary kernel memory leak, revealing the original hashed password of a vulnerable system. attack.
Preliminary investigation shows that all Intel processors starting with Haswell (released in 2013) extending to the latest Ice Lake-SP and Alder Lake are affected by the security vulnerability mentioned above. above. However, Intel says the company is about to release a software patch to mitigate this problem.
Besides, many core architectures from Arm, including Cortex A15, A57, A72 as well as Neoverse V1, N1 and N2 are also affected. Arm is expected to release a fix patch in the near future. It is not clear at this time whether custom versions of these cores (e.g. select cores from Qualcomm) will be affected, and when potential security vulnerabilities will be addressed.
Since this is a proof-of-concept vulnerability and is being worked on by Intel and Arm, it cannot be exploited to attack a client or server right now - as long as all the latest patches are installed. full. There is no indication that the mitigations will affect processor performance.
You should read it
- What to do to protect the device from ZombieLoad attack?
- Acer, Dell, Fujitsu, HP, Lenovo, Panasonic are affected by Intel's security flaws
- Microsoft released an Intel chip patch
- Intel will fix Meltdown and Specter over 90% of new products within 1 week
- Overview of vulnerabilities on Intel, AMD, ARM chips: Meltdown and Specter
- How to know if your Windows computer is affected by Meltdown and Specter?
- New dangerous vulnerability in Intel CPU: Works like Specter and Meltdown, threatening all PCs and the cloud
- Intel is about to launch a new Wifi chip that makes web browsing speed unbelievably fast
May be interested
- Top cheap gaming CPUs worth buying in 2023thanks to recent cpu lineups from both intel and amd, gamers on a tight budget have more options. amd's zen 3 architecture in ryzen 5000 cpus and intel's 12th gen core cpus has helped create powerful gaming chips without breaking the bank.
- Microsoft and Intel cooperated to provide microcode updates for the CPU via Windows updatesmicrosoft and intel have teamed up to provide users with intel cpu microcode updates to overcome the specter v2 vulnerability through a windows update package.
- Overview of vulnerabilities on Intel, AMD, ARM chips: Meltdown and Spectertwo newly discovered major computer chip security bugs, called meltdown and specter, affect most of the devices manufactured in the last 20 years. the level of influence of these two security bugs on devices is still being calculated, but it can lead to the server on the cloud computing platform being compromised, leading to bad effects. than.
- Intel: After installing Specter / Meltdown vulnerability patch your computer will slow down to 10%after evaluating performance changes in 6th, 7th and 8th generation intel-powered computers running windows 10, intel has concluded that your computer will be slow from 6 to 10 % after installing specter / meltdown fix.
- Apple confirmed that all Mac and iOS devices are affected by Meltdown and Specterafter days of complete silence, apple finally spoke up.
- Instructions for checking the Specter vulnerability for the browser with Tencent's toolto see if the browser with your current version is vulnerable to specter, you can use tencent's tool to check.
- Microsoft released an Intel chip patchmicrosoft has just released an unusual security update for windows to fix bugs on intel, amd and arm chips recently.
- The security feature prevents the Specter vulnerability, which makes Chrome account for 10-13% more computer RAMsite isolation is a security feature that separates the layout of individual web pages in order to limit this web attack to the other web. this feature will be turned on by default for most chrome users on win, mac, linux and chrome os to protect computers from attacks through the specter vulnerability.
- PC with Skylake and Kaby Lake CPUs failed to restart automatically after installing Meltdown & Specter patchnavin shenoy, intel's vice president, confirmed that pc systems using skylake and kaby lake high-end cpus after being patched with two serious security holes, meltdown and specter, also suffered from self-initiated errors. move again.
- Top 5 best Intel CPUs 2022intel has always been at the forefront of gaming and productivity, with a series of new chips that vastly improve on the previous generation while also outperforming rival amd.