Wednesday, December 11th 2019
New "Plundervolt" Intel CPU Vulnerability Exploits vCore to Fault SGX and Steal Protected Data
A group of cybersecurity researchers have discovered a new security vulnerability affecting Intel processors, which they've craftily named "Plundervolt," a portmanteau of the words "plunder" and "undervolt." Chronicled under CVE-2019-11157, it was first reported to Intel in June 2019 under its security bug-bounty programme, so it could secretly develop a mitigation. With the 6-month NDA lapsing, the researchers released their findings to the public. Plundervolt is described by researchers as a way to compromise SGX (software guard extensions) protected memory by undervolting the processor when executing protected computations, to a level where SGX memory-encryption no longer protects data. The researchers have also published proof-of-concept code.
Plundervolt is different from "Rowhammer," in that it flips bits inside the processor, before they're written to the memory, so SGX doesn't protect them. Rowhammer doesn't work with SGX-protected memory. Plundervolt requires root privileges as software that let you tweak vCore require ring-0 access. You don't need direct physical access to the target machine, as tweaking software can also be remotely run. Intel put out security advisory SA-00298 and is working with motherboard vendors and OEMs to release BIOS updates that pack a new microcode with a mitigation against this vulnerability. The research paper can be read here.
Source:
Plundervolt
Plundervolt is different from "Rowhammer," in that it flips bits inside the processor, before they're written to the memory, so SGX doesn't protect them. Rowhammer doesn't work with SGX-protected memory. Plundervolt requires root privileges as software that let you tweak vCore require ring-0 access. You don't need direct physical access to the target machine, as tweaking software can also be remotely run. Intel put out security advisory SA-00298 and is working with motherboard vendors and OEMs to release BIOS updates that pack a new microcode with a mitigation against this vulnerability. The research paper can be read here.
74 Comments on New "Plundervolt" Intel CPU Vulnerability Exploits vCore to Fault SGX and Steal Protected Data
Can't researchers shut up about these and make them confidental?
Also, I don't care about privacy cr4p at all. Just let me have full performance from the processor, please.
What is most important, since the vulnerabilities, companies purchasing Intel desktops from HP or any other vendor, might have an issue with them for selling security flawed equipment. There has to be a response to the vulnerabilities from the market.
holesvulnerabilities are more interesting than their (upcoming) products themselves :laugh:Intel Launches Horse Ridge Chip for Quantum Computing Systems
BTW. A cheaper stone :)
also, I think you care if your credit card details were stolen :)
*Sigh*
Exploits like these are like saying your car is vulnerable to being stolen...if you give the car thief your car keys and walk him to your car.
And why are people still buying Intel CPU's? When AMD has the best processors on the planet. lol
Intel does have a bug bounty program on HackerOne, though, at the very least.