Zombieload flaw affects most modern Intel chips

By Dylan Bushell-Embling
Friday, 17 May, 2019

Zombieload flaw affects most modern Intel chips

Researchers have discovered a critical flaw in nearly all Intel processors released since 2011 that could allow attackers to access any data that has been recently accessed by the processor.

The Zombieload exploit was discovered by the same Dutch researchers who found the similar Meltdown and Spectre vulnerabilities last year.

The hardware exploit involves taking advantage of a flaw in Intel’s Microarchitectural Data Sampling (MDS) speculative execution technology to access data being used by applications, containers and virtual machines.

Intel has admitted that the exploit “may allow a malicious user who can locally execute code on a system to infer the values of protected data otherwise protected by architectural mechanisms”.

While it would be extremely difficult to target particular data on a system, attackers may be able to infer protected data by collecting and analysing large amounts of data. User-level and system-level information could equally be exposed in this way.

The Zombieload speculative execution method could potentially be used to expose data in store buffers within CPUs caches, temporary buffers between CPU caches and temporary buffers used while loading data into registers.

While Intel is releasing new microcode updates to help software mitigate these issues, these protective measures will require changes and updates to operating systems, hypervisors and Intel Software Guard Extensions. Companies including Microsoft, Red Hat and VMware have already released software updates to mitigate the vulnerabilities.

Security experts have advised that the only way to almost fully protect against the use of the exploit is to disable hyperthreading on affected CPUs, which Intel says could reduce processor performance by up to 9%.

But according to the researchers, this would not prevent attacks on system call return paths that leak data from kernel space to user space.

Image credit: ©iStockphoto.com/au/Paul Fleet

Please follow us and share on Twitter and Facebook. You can also subscribe for FREE to our weekly newsletter and quarterly magazine.

Related News

Pitney Bowes hit by ransomware attack

Logistics and e-commerce technology company Pitney Bowes is working to restore services after a...

Thoma Bravo bids $5.6bn for Sophos

The board of UK-based security company Sophos will unanimously recommend a US$3.82bn takeover...

Proofpoint uncovers malware delivery service for hire

Security company Proofpoint has provided details of a staged malware downloader they are calling...

  • All content Copyright © 2019 Westwick-Farrow Pty Ltd