Vulnerabilities in AMD and Intel CPUs
ÆPIC Leak and Squip
New vulnerabilities in AMD and Intel processors: Security researchers have discovered two vulnerabilities in the CPUs. What you can do about it.
News
Two newly discovered vulnerabilities in processors from Intel and AMD allow attackers to read external data. The vulnerabilities were discovered by research groups led by security researcher Daniel Gruss, who was already jointly responsible for the discovery of Specter and Meltdown.
The much more critical vulnerability is true to its name ÆPIC Leak (CVE-2022-21233). Most current Intel processors of the 10th, 11th and 12th generation are affected. According to the researchers, ÆPIC Leak is an architectural error in which sensitive data can be read directly. Unlike Meltdown and Specter, this is not a side-channel attack.
Due to the bug the researchers discovered, old data is not overwritten as desired. Using a circuit (interrupt controller, APIC), attackers can read unencrypted data that is actually safely stored in a so-called SGX enclave (Explanation) should be filed.
However, since the attack has some limitations, the researchers consider most systems to be secure. Administrator rights must be available for the attack. Also, not all of the data stored in the interrupt controller can be read out. If you want to be on the safe side and protect yourself from ÆPIC Leak, you can disable SGX. Intel has also already announced a Firmware update to fix the problem to work.
That is not quite as explosive second vulnerability which probably affects multithreading-capable AMD CPUs based on Zen 2 and Zen 3, but certainly the Ryzen 7 3700X, Ryzen 7 5700X and Epyc 7443 models.
In the Squip (CVE-2021-46778) The vulnerability named above is a side-channel attack with similarities to Spectre. Here, too, the efficient processing of commands is used.
To increase efficiency, the processor breaks down instructions into microinstructions, which are then sorted (out-of-order) and processed. However, the μ-Op scheduler responsible for sorting the microinstructions can be manipulated by attackers, which allows conclusions to be drawn about the processed instructions, including crypto keys for reading encrypted data.
To protect yourself from attacks with Squip, the researchers recommend, among other things, switching off SMT (Simultaneous Multithreading).
Continue to home page
Reference-www.pc-magazin.de