News & Updates UPDATED: 26 August 2021

Severe security exploit renders all modern CPUs vulnerable

Yorgos Fountis

2 min read
Image for Severe security exploit renders all modern CPUs vulnerable

Well, we hate starting 2018 with this kind of an update, but a series of security vulnerabilities called Spectre and Meltdown made the news recently. These vulnerabilities are serious and unreal enough to be out of a Mr Robot episode. They can be exploited in almost all modern CPUs and are independent of the operating system. And as if this doesn’t sound scary enough, they were present in Intel architectures for many years without anyone knowing anything.
Both vulnerabilities exploit modern CPU optimisation techniques such as out-of-order execution and branch-prediction. The result is attackers being able  to read arbitrary memory locations, even inside other processes or VMs, or execute arbitrary code in memory. Branch prediction is a CPU technique that is used to predict how an “if-then-else” statement will occur,  offering significant performance gains. By using Spectre however, one can trick the CPU to miscalculate and branch to an arbitrary memory location and execute arbitrary code.

Out of order execution is another technique by which the processor, instead of waiting for some data to be ready until it executes the next command, fetches and executes the data that is available right now, re-ordering the results accordingly afterwards. Because a certain CPU cache is changed every time that the CPU does out-of-order lookups, researchers have found a way to exploit this. By capturing side-channel information (such as these changes in the cache) and transmitting them to the outside world via a covert channel, see the Flush+Reload section in (1) , an attacker on the receiving end can use this information to reconstruct the register value. This can be effectively used to dump the entire kernel memory.

The impact is frighteningly wide, affecting multiple devices such as PCs, laptops, tablets and even smartphones. According to Paul Kocher et al. (1):

We have empirically verified the vulnerability of several Intel processors to Spectre attacks, including Ivy Bridge, Haswell and Skylake based processors. We have also verified the attack’s applicability to AMD Ryzen CPUs. Finally, we have also successfully mounted Spectre attacks on several Samsung and Qualcomm processors (which use an ARM architecture) found in popular mobile phones.

Hair-raising stuff really. 

Our upstream provider is planning on deploying Meltdown and Spectre mitigations for its entire fleet starting next week. We’re closely monitoring the matter, and we’ll keep you posted. 

(1) Paul Kocher , Daniel Genkin , Daniel Gruss , Werner Haas , Mike Hamburg , Moritz Lipp , Stefan Mangard , Thomas Prescher , Michael Schwarz , Yuval Yarom. “Spectre Attacks: Exploiting Speculative Execution”.  Independent, University of Pennsylvania, University of Maryland,  Graz University of Technology, Cyberus Technology, Rambus, Cryptography Research Division,University of Adelaide and Data61.

Host your website with Pressidium

60-DAY MONEY BACK GUARANTEE

SEE OUR PLANS

Do you like this article?

Subscribe to our blog and get awesome WordPress content straight to your inbox.

SUBSCRIBE

OUR READERS ALSO VIEWED:

Using PHP 8.0

PHP 8.0 is the latest major PHP upgrade, bringing performance updates and optimizations as well as new exciting language features!
Petros Koumantarakis
Petros Koumantarakis
2 min read
WordPress 5.8

WordPress 5.8 is Here… Find Out What’s New!

WordPress 5.8 has arrived and with it come some amazing feature releases to enjoy! Find out all about them in this article.
Alexander Newnham
Alexander Newnham
10 min read

June 2021 Features Roundup

Each month we take a look back at the new features and updates that have been released at Pressidium. See what was new for June!
Alexander Newnham
Alexander Newnham
3 min read

WordPress 5.7 Is Here… Find Out What’s New!

WordPress 5.7 is here! There are a number of great updates to enjoy. Find out all about them in this article.
Alexander Newnham
Alexander Newnham
7 min read
SUBSCRIBE