Breaking

Friday, June 12, 2020

Flash News: Intel chipsets hit by another major security flaw

Flash News: Intel chipsets hit by another major security flaw

Flash News: Intel chipsets hit by another major security flaw

SGAxe attack steals protected data from what's meant to be the safest a part of an Intel processor

Intel processors face another major security threat after researchers uncovered a replacement attack on the company's hardware.

Known as SGAxe, the attack targets a supposedly super-secure function within Intel processors within the latest plan to steal protected user data during a long line of attacks since 2018's Meltdown and Spectre threats.

Intel says it's already released fixes and patches to hide a number of the damage, but some issues still remain a threat, with machines using the company's 9th generation Coffee Lake Refresh processors particularly in danger.

SGAxe attack

SGAxe breaches the safety guarantees of Intel Software Guard eXtensions (SGX) services, which look to guard the inner workings of a system alongside vital data like passwords and encryption keys.

Developed by the corporate, SGX may be a security feature built into Intel processors that permits apps to work and run within blocks of secure memory referred to as "enclaves" - protected software containers that provide hardware-based memory encryption for high-end protection.

Using SGAxe, an attacker could steal legitimate SGX attestation keys from Intel’s quoting enclave in existing SGX machines, meaning they might then impersonate such systems and gain access to focus on devices.

The researchers note that there's no evidence the flaw was exploited within the wild but alerted Intel as soon because it was discovered. However SGAxe does appear to be an evolution of the CacheOut attack revealed in January, with the 2 exploits ready to add tandem to interrupt into systems.


Intel says it's performing on a fix to hide both attacks, with a microcode update coming soon.

"The CacheOut researchers recently informed us of a replacement paper mentioned as SGAxe," Intel Director of Communications Jerry Bryant said during a statement.

"It is vital to notice that SGAxe relies on CVE-2020-0549 which has been mitigated in microcode (confirmed by the researchers in their updated CacheOut paper) and distributed bent the ecosystem."

The company has also published an inventory of affected processors for users looking to ascertain if their systems are in danger.



Source URL

No comments:

Post a Comment