• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.

Intel CPUs Since Haswell Vulnerable to "Zombieload v2" Attacks, "Cascade Lake" Included

Joined
Jul 5, 2013
Messages
27,761 (6.67/day)
Physical access is not needed. Admin is. Remote or not is irrelevant.
That is incorrect. Section4, the very first sentence reads as follows; "Following most side-channel attacks, we assume the attacker can execute unprivileged native code on the target machine"' This directly implies physical access by a logged in user. Additionally, in the paragraph "User-Space Leakage" it states that "In the cross-process user-space scenario, an unprivileged attacker leaks values loaded or stored by another concurrently running user-space application. We consider such a cross-process scenario most dangerous for end users. Many secrets are likely to be found in user-space applications such as browsers. The attacker is co-located with the victim on the same physical but a different logical CPU core, a common case for hyperthreading." Network users login using a different protocol than physical access users. The user-space parameters effect side-channel access adversely.

Such requirements need physical access in the initial stage of any attack, whether by fully executing the attack in physical presence or by starting the attack with physical presence and handing off to a remote user. Regardless of the following stages of any attack, the use of this vulnerability requires physical access to the machine being attacked.
 
Joined
Oct 10, 2009
Messages
937 (0.17/day)
System Name Desktop
Processor AMD Ryzen 7 5800X3D
Motherboard MAG X570S Torpedo Max
Cooling Corsair H100x
Memory 64GB Corsair CMT64GX4M2C3600C18 @ 3600MHz / 18-19-19-39-1T
Video Card(s) EVGA RTX 3080 Ti FTW3 Ultra
Storage Kingston KC3000 1TB + Kingston KC3000 2TB + Samsung 860 EVO 1TB
Display(s) 32" Dell G3223Q (2160p @ 144Hz)
Case Fractal Meshify 2 Compact
Audio Device(s) ifi Audio ZEN DAC V2 + Focal Radiance / HyperX Solocast
Power Supply Super Flower Leadex V Platinum Pro 1000W
Mouse Razer Viper Ultimate
Keyboard Razer Huntsman V2 Optical (Linear Red)
Software Windows 11 Pro x64
It seems Intel has been twisting the truth and bullying researchers again....

Intel’s security response team worked for the next eight months to verify the findings and develop a patch, scheduled to be released on May 14. Four days before the release, however, when the company provided the researchers with details of the fix, the researchers quickly realized that the patch didn’t address all of the vulnerabilities.

Intel’s engineers had overlooked some of the proof-of-concept exploits the researchers had provided. But the researchers said that even without seeing the exploits, Intel should have been able to uncover the additional vulnerabilities on their own.

The researchers said Intel had chosen an ineffective way to address its chip vulnerabilities. Rather than fix the core issue, which would possibly require redesigning the processor, it has patched each variant as it is discovered.

Source: The New York Times

Sounds like Intel is rather incompetent and care more about their reputation and market position than anything else.
 
Joined
Mar 6, 2017
Messages
3,329 (1.18/day)
Location
North East Ohio, USA
System Name My Ryzen 7 7700X Super Computer
Processor AMD Ryzen 7 7700X
Motherboard Gigabyte B650 Aorus Elite AX
Cooling DeepCool AK620 with Arctic Silver 5
Memory 2x16GB G.Skill Trident Z5 NEO DDR5 EXPO (CL30)
Video Card(s) XFX AMD Radeon RX 7900 GRE
Storage Samsung 980 EVO 1 TB NVMe SSD (System Drive), Samsung 970 EVO 500 GB NVMe SSD (Game Drive)
Display(s) Acer Nitro XV272U (DisplayPort) and Acer Nitro XV270U (DisplayPort)
Case Lian Li LANCOOL II MESH C
Audio Device(s) On-Board Sound / Sony WH-XB910N Bluetooth Headphones
Power Supply MSI A850GF
Mouse Logitech M705
Keyboard Steelseries
Software Windows 11 Pro 64-bit
Benchmark Scores https://valid.x86.fr/liwjs3
That is incorrect. Section4, the very first sentence reads as follows; "Following most side-channel attacks, we assume the attacker can execute unprivileged native code on the target machine"' This directly implies physical access by a logged in user. Additionally, in the paragraph "User-Space Leakage" it states that "In the cross-process user-space scenario, an unprivileged attacker leaks values loaded or stored by another concurrently running user-space application. We consider such a cross-process scenario most dangerous for end users. Many secrets are likely to be found in user-space applications such as browsers. The attacker is co-located with the victim on the same physical but a different logical CPU core, a common case for hyperthreading." Network users login using a different protocol than physical access users. The user-space parameters effect side-channel access adversely.

Such requirements need physical access in the initial stage of any attack, whether by fully executing the attack in physical presence or by starting the attack with physical presence and handing off to a remote user. Regardless of the following stages of any attack, the use of this vulnerability requires physical access to the machine being attacked.
What if someone were to have remote access in the sense that somehow login credentials were stolen and were subsequently used to attack the system via either SSH or via Remote Desktop?

Yes, I know... at that point you've got more problems than a processor exploit.
 
Joined
Aug 20, 2007
Messages
21,463 (3.40/day)
System Name Pioneer
Processor Ryzen R9 9950X
Motherboard GIGABYTE Aorus Elite X670 AX
Cooling Noctua NH-D15 + A whole lotta Sunon and Corsair Maglev blower fans...
Memory 64GB (4x 16GB) G.Skill Flare X5 @ DDR5-6000 CL30
Video Card(s) XFX RX 7900 XTX Speedster Merc 310
Storage Intel 905p Optane 960GB boot, +2x Crucial P5 Plus 2TB PCIe 4.0 NVMe SSDs
Display(s) 55" LG 55" B9 OLED 4K Display
Case Thermaltake Core X31
Audio Device(s) TOSLINK->Schiit Modi MB->Asgard 2 DAC Amp->AKG Pro K712 Headphones or HDMI->B9 OLED
Power Supply FSP Hydro Ti Pro 850W
Mouse Logitech G305 Lightspeed Wireless
Keyboard WASD Code v3 with Cherry Green keyswitches + PBT DS keycaps
Software Gentoo Linux x64 / Windows 11 Enterprise IoT 2024
That is incorrect. Section4, the very first sentence reads as follows; "Following most side-channel attacks, we assume the attacker can execute unprivileged native code on the target machine"' This directly implies physical access by a logged in user.

What leads you to believe that? What word in that sentence implies physical access? Native code just means machine code, and unpriviledged just means normal user level. This is literally anyone that can login and execute a program. Nothing about it requires them to be physically there.

What if someone were to have remote access in the sense that somehow login credentials were stolen and were subsequently used to attack the system via either SSH or via Remote Desktop?

Yes, I know... at that point you've got more problems than a processor exploit.

Bingo. And yes, you have larger issues at that point, but again, it's another tool for malware writers to use, and you should never give them more.
 
Joined
Jul 5, 2013
Messages
27,761 (6.67/day)
What leads you to believe that? What word in that sentence implies physical access? Native code just means machine code, and unpriviledged just means normal user level. This is literally anyone that can login and execute a program. Nothing about it requires them to be physically there.
A detailed explanation would require pages. It is sufficient to say that the initial stages of such an attack must include a physical presence element to succeed. It can not be pulled off 100% remotely.
 
Joined
Mar 6, 2017
Messages
3,329 (1.18/day)
Location
North East Ohio, USA
System Name My Ryzen 7 7700X Super Computer
Processor AMD Ryzen 7 7700X
Motherboard Gigabyte B650 Aorus Elite AX
Cooling DeepCool AK620 with Arctic Silver 5
Memory 2x16GB G.Skill Trident Z5 NEO DDR5 EXPO (CL30)
Video Card(s) XFX AMD Radeon RX 7900 GRE
Storage Samsung 980 EVO 1 TB NVMe SSD (System Drive), Samsung 970 EVO 500 GB NVMe SSD (Game Drive)
Display(s) Acer Nitro XV272U (DisplayPort) and Acer Nitro XV270U (DisplayPort)
Case Lian Li LANCOOL II MESH C
Audio Device(s) On-Board Sound / Sony WH-XB910N Bluetooth Headphones
Power Supply MSI A850GF
Mouse Logitech M705
Keyboard Steelseries
Software Windows 11 Pro 64-bit
Benchmark Scores https://valid.x86.fr/liwjs3
A detailed explanation would require pages. It is sufficient to say that the initial stages of such an attack must include a physical presence element to succeed. It can not be pulled off 100% remotely.
Oh, how I could poke holes in that theory! Have you ever heard of two types of exploits called Remote Code Execution and the oh so wonderful Privilege Escalation exploit? No one single type of exploit could be used to attack a system via these processor exploits but if an attacker were to somehow bundle the processor exploit into an exploit chain that follows these steps...
  1. Sends a block of data to a program that then causes a buffer overflow that overwrites the program stack of an exploitable program.
  2. The aforementioned exploit then takes advantage of a privilege escalation which essentially makes whatever malicious code run at a level that's higher than that of the host program.
  3. Download additional malicious code and execute it.
  4. ???
  5. Profit!
This has happened multiple times in everyone's favorite punching bag of a web browser called Internet Explorer! Not a month goes by where we don't read in some security bulletin where there was an issue with memory handling and... well, you get the idea.

The whole idea is that you can, at least in theory, line up your exploits in a chain and despite the chain being made up of little pieces, they come together to do much more damage than if they were to be used individually.
 
Joined
Jul 5, 2013
Messages
27,761 (6.67/day)
The whole idea is that you can, at least in theory, line up your exploits in a chain and despite the chain being made up of little pieces, they come together to do much more damage than if they were to be used individually.
Perhaps, but like Spectre and all of the other side-channel type attacks, remote execution is extremely difficult. So difficult that no proof of concept attack has yet been successful. It's as you stated, only theory. So until anyone has proof that it can actually be pulled off, remote attacks are not possible and thus require a physical presence component. This new vulnerability is fundamentally no different.
 
Joined
Mar 6, 2017
Messages
3,329 (1.18/day)
Location
North East Ohio, USA
System Name My Ryzen 7 7700X Super Computer
Processor AMD Ryzen 7 7700X
Motherboard Gigabyte B650 Aorus Elite AX
Cooling DeepCool AK620 with Arctic Silver 5
Memory 2x16GB G.Skill Trident Z5 NEO DDR5 EXPO (CL30)
Video Card(s) XFX AMD Radeon RX 7900 GRE
Storage Samsung 980 EVO 1 TB NVMe SSD (System Drive), Samsung 970 EVO 500 GB NVMe SSD (Game Drive)
Display(s) Acer Nitro XV272U (DisplayPort) and Acer Nitro XV270U (DisplayPort)
Case Lian Li LANCOOL II MESH C
Audio Device(s) On-Board Sound / Sony WH-XB910N Bluetooth Headphones
Power Supply MSI A850GF
Mouse Logitech M705
Keyboard Steelseries
Software Windows 11 Pro 64-bit
Benchmark Scores https://valid.x86.fr/liwjs3
So difficult that no proof of concept attack has yet been successful.
YET! I like how you used the word "yet" in what you said.
So until anyone has proof that it can actually be pulled off, remote attacks are not possible and thus require a physical presence component.
Again, if history has shown us, it's possible. You just need to get all of your ducks in a row and deliver the attack just like how Internet Explorer has been attacked in the past.

Think about Google Chrome, people once said that Google Chrome has an impenetrable sandbox and that nothing can escape it. Yeah... we've seen how that has played out. All it takes is the right exploits put in a chain in the right order and then oh crap, the sandbox has been breached.
 
Joined
Jul 5, 2013
Messages
27,761 (6.67/day)
YET! I like how you used the word "yet" in what you said.
The possibility exists, thus "yet"...
Again, if history has shown us, it's possible. You just need to get all of your ducks in a row and deliver the attack just like how Internet Explorer has been attacked in the past.
In most other situations, I would agree. However the particulars of these vulnerabilities are known and that knowledge shows the extreme difficulty of remote attack. It is so ridiculously difficult that it is effectively impossible at this time, which is why no proof of concept attempt at remote attack has been successful. Physical attacks is been pulled off but at considerable difficulty. The conditions literally have to be perfect.
Think about Google Chrome, people once said that Google Chrome has an impenetrable sandbox and that nothing can escape it.
That is a browser, a piece of software. And only fools bought into the idea you suggest. However, the vulnerabilities we're discussing are hardware based and are an entirely different beast. Exploiting them is a very different task altogether.
 
Joined
Aug 20, 2007
Messages
21,463 (3.40/day)
System Name Pioneer
Processor Ryzen R9 9950X
Motherboard GIGABYTE Aorus Elite X670 AX
Cooling Noctua NH-D15 + A whole lotta Sunon and Corsair Maglev blower fans...
Memory 64GB (4x 16GB) G.Skill Flare X5 @ DDR5-6000 CL30
Video Card(s) XFX RX 7900 XTX Speedster Merc 310
Storage Intel 905p Optane 960GB boot, +2x Crucial P5 Plus 2TB PCIe 4.0 NVMe SSDs
Display(s) 55" LG 55" B9 OLED 4K Display
Case Thermaltake Core X31
Audio Device(s) TOSLINK->Schiit Modi MB->Asgard 2 DAC Amp->AKG Pro K712 Headphones or HDMI->B9 OLED
Power Supply FSP Hydro Ti Pro 850W
Mouse Logitech G305 Lightspeed Wireless
Keyboard WASD Code v3 with Cherry Green keyswitches + PBT DS keycaps
Software Gentoo Linux x64 / Windows 11 Enterprise IoT 2024
A detailed explanation would require pages. It is sufficient to say that the initial stages of such an attack must include a physical presence element to succeed. It can not be pulled off 100% remotely.

Uh... no. Not if you have an account with say, RDP rights. If you can execute native code you can do it, it doesn't matter how you got there. Physical access is simply not a requirement.

Perhaps, but like Spectre and all of the other side-channel type attacks, remote execution is extremely difficult. So difficult that no proof of concept attack has yet been successful. It's as you stated, only theory. So until anyone has proof that it can actually be pulled off, remote attacks are not possible and thus require a physical presence component. This new vulnerability is fundamentally no different.

I could do it to you today with an unmitigated system with user level rights. I'd be admin in less than a day.

A detailed explanation would require pages.

No, I don't think so. The concepts are simple enough.

Remember, security consulting is literally my day job here.
 
Last edited:
Joined
Jul 5, 2013
Messages
27,761 (6.67/day)
I could do it to you today with an unmitigated system with user level rights. I'd be admin in less than a day.
Sorry, can't accept that without evidence. No one has been able to do it without physical access, at least no one is showing proof of such.
 
Joined
Aug 20, 2007
Messages
21,463 (3.40/day)
System Name Pioneer
Processor Ryzen R9 9950X
Motherboard GIGABYTE Aorus Elite X670 AX
Cooling Noctua NH-D15 + A whole lotta Sunon and Corsair Maglev blower fans...
Memory 64GB (4x 16GB) G.Skill Flare X5 @ DDR5-6000 CL30
Video Card(s) XFX RX 7900 XTX Speedster Merc 310
Storage Intel 905p Optane 960GB boot, +2x Crucial P5 Plus 2TB PCIe 4.0 NVMe SSDs
Display(s) 55" LG 55" B9 OLED 4K Display
Case Thermaltake Core X31
Audio Device(s) TOSLINK->Schiit Modi MB->Asgard 2 DAC Amp->AKG Pro K712 Headphones or HDMI->B9 OLED
Power Supply FSP Hydro Ti Pro 850W
Mouse Logitech G305 Lightspeed Wireless
Keyboard WASD Code v3 with Cherry Green keyswitches + PBT DS keycaps
Software Gentoo Linux x64 / Windows 11 Enterprise IoT 2024
Sorry, can't accept that without evidence. No one has been able to do it without physical access, at least no one is showing proof of such.

I mean, they literally state that in the whitepaper and even provide tool POC's for it.

You'd need an existing ability to execute native code on the system. If you have rdp or even telnet rights, you have that. This is why it's important to trust your users... even with the mitigations.

Frankly, the only claim without evidence is yours. The very sentence of the whitepaper you cite contradicts your claim.
 
Joined
Jul 5, 2013
Messages
27,761 (6.67/day)
I mean, they literally state that in the whitepaper and even provide tool POC's for it.
Showing how it's done is not the same as actually doing it. And as that has not been done...
If you have rdp or even telnet rights, you have that.
Rarely implemented on systems that would be viable targets of such attack attempts.
 
Last edited:
Joined
Feb 3, 2017
Messages
3,753 (1.32/day)
Processor Ryzen 7800X3D
Motherboard ROG STRIX B650E-F GAMING WIFI
Memory 2x16GB G.Skill Flare X5 DDR5-6000 CL36 (F5-6000J3636F16GX2-FX5)
Video Card(s) INNO3D GeForce RTX™ 4070 Ti SUPER TWIN X2
Storage 2TB Samsung 980 PRO, 4TB WD Black SN850X
Display(s) 42" LG C2 OLED, 27" ASUS PG279Q
Case Thermaltake Core P5
Power Supply Fractal Design Ion+ Platinum 760W
Mouse Corsair Dark Core RGB Pro SE
Keyboard Corsair K100 RGB
VR HMD HTC Vive Cosmos
I could do it to you today with an unmitigated system with user level rights. I'd be admin in less than a day.
What is the minimum level of access you need for this?
 
Joined
Aug 20, 2007
Messages
21,463 (3.40/day)
System Name Pioneer
Processor Ryzen R9 9950X
Motherboard GIGABYTE Aorus Elite X670 AX
Cooling Noctua NH-D15 + A whole lotta Sunon and Corsair Maglev blower fans...
Memory 64GB (4x 16GB) G.Skill Flare X5 @ DDR5-6000 CL30
Video Card(s) XFX RX 7900 XTX Speedster Merc 310
Storage Intel 905p Optane 960GB boot, +2x Crucial P5 Plus 2TB PCIe 4.0 NVMe SSDs
Display(s) 55" LG 55" B9 OLED 4K Display
Case Thermaltake Core X31
Audio Device(s) TOSLINK->Schiit Modi MB->Asgard 2 DAC Amp->AKG Pro K712 Headphones or HDMI->B9 OLED
Power Supply FSP Hydro Ti Pro 850W
Mouse Logitech G305 Lightspeed Wireless
Keyboard WASD Code v3 with Cherry Green keyswitches + PBT DS keycaps
Software Gentoo Linux x64 / Windows 11 Enterprise IoT 2024
Rarely implemented on systems that would be viable targets of such attack attempts.

Often implemented on cloud providers, and regardless, completely irrelevant to your claim that physical access is a hard requirement.

What is the minimum level of access you need for this?

Remote desktop or command line. Basically, write access to a directory and ability to spawn a process.

Could theoretically be done with less, but never done it personally.

Mind you, this isn't just theory in my case. I have done this for a client in the past to restore admin rights to a bad-admin firing situation on a cloud server. Gotta love meltdown unmitigated servers.
 
Last edited:
Joined
Jul 5, 2013
Messages
27,761 (6.67/day)
Mind you, this isn't just theory in my case. I have done this for a client in the past to restore admin rights to a bad-admin firing situation on a cloud server. Gotta love meltdown unmitigated servers.
If you can provide a link to a successful attack demonstration, I'd be happy to read it.
 
Joined
Aug 20, 2007
Messages
21,463 (3.40/day)
System Name Pioneer
Processor Ryzen R9 9950X
Motherboard GIGABYTE Aorus Elite X670 AX
Cooling Noctua NH-D15 + A whole lotta Sunon and Corsair Maglev blower fans...
Memory 64GB (4x 16GB) G.Skill Flare X5 @ DDR5-6000 CL30
Video Card(s) XFX RX 7900 XTX Speedster Merc 310
Storage Intel 905p Optane 960GB boot, +2x Crucial P5 Plus 2TB PCIe 4.0 NVMe SSDs
Display(s) 55" LG 55" B9 OLED 4K Display
Case Thermaltake Core X31
Audio Device(s) TOSLINK->Schiit Modi MB->Asgard 2 DAC Amp->AKG Pro K712 Headphones or HDMI->B9 OLED
Power Supply FSP Hydro Ti Pro 850W
Mouse Logitech G305 Lightspeed Wireless
Keyboard WASD Code v3 with Cherry Green keyswitches + PBT DS keycaps
Software Gentoo Linux x64 / Windows 11 Enterprise IoT 2024
If you can provide a link to a successful attack demonstration, I'd be happy to read it.

You have the whitepaper documenting the methods. I really can't help you beyond that, it's not as though I can provide a link for you to click that will instaprove I did this.

It is more complex than a point and click attack though. These attacks really only leak data you'd not otherwise know. On it's own, that won't escalate privildges, but there are plenty of other exploits to chain with that that will.

At the end, it needs human involvement. If that's what you mean by physical access, 100% agree.
 
Last edited:

Easy Rhino

Linux Advocate
Staff member
Joined
Nov 13, 2006
Messages
15,583 (2.37/day)
Location
Mid-Atlantic
System Name Desktop
Processor i5 13600KF
Motherboard AsRock B760M Steel Legend Wifi
Cooling Noctua NH-U9S
Memory 4x 16 Gb Gskill S5 DDR5 @6000
Video Card(s) Gigabyte Gaming OC 6750 XT 12GB
Storage WD_BLACK 4TB SN850x
Display(s) Gigabye M32U
Case Corsair Carbide 400C
Audio Device(s) On Board
Power Supply EVGA Supernova 650 P2
Mouse MX Master 3s
Keyboard Logitech G915 Wireless Clicky
Software The Matrix
I still don't understand how anyone but a bad actor physically tampering with the CPU and then installing it on a target server could exploit this bug. You have to have access to the microcode which means you are not writing garden variety software that you can run at the OS level.
 
Joined
Jul 5, 2013
Messages
27,761 (6.67/day)
You have the whitepaper documenting the methods.
Documenting a theorized situation and actual practical implementation are two very different things.
I really can't help you beyond that, it's not as though I can provide a link for you to click that will instaprove I did this.
And I have no desire to imply you are being less than truthful. However, your attempt was clearly with the approval and involvement of the owner/administrator of the target system, very likely present at the target system itself, or at the very least logged on opening the door for you to render exploitation.
It is more complex than a point and click attack though. These attacks really only leak data you'd not otherwise know. On it's own, that won't escalate privileges, but there are plenty of other exploits to chain with that that will.
Of course.
At the end, it needs human involvement. If that's what you mean by physical access, 100% agree.
I've spent time over the past few days to further research how this and the other side-channel type vulnerabilities can be exploited and a few things have been made very clear;
1. No known attack(successful or otherwise, proof of concept or otherwise) has been documented thus far.
2. While in theory a remote attack is possible, circumstances have to be so very perfect(or be made so) as to be virtually impossible without human input at the target system.
3. Given the difficulty involved, attacks most certainly will require a degree of physical presence at the target system.
4. While the average user is unlikely to have the high levels of security measures implemented that one would find on a business/enterprise system, average users generally do not use the entry points required to render an attack, thus making them effectively protected anyway.
5. Average users, even those targeted by criminal investigations, do not have information valuable enough to justify the difficulty involved in a remote attack attempt(though in practical terms, physical access would be far easier to achieve, assuming such access would be lawful).
6. Rendering attack against power users, such as many of us here at TPU who take personal security very seriously, would make any attempt so extremely unlikely that success is effectively impossible.
7. Attempts will be noticed. An attacker will get 2, maybe 3, attempts before the actions taken to effect such attack will be noticed.

While technically possible, remote exploitation of these types of vulnerabilities is so, ironically, remote as to be effectively impossible without some level of human presence at the target system.
 
Last edited:
Joined
Jan 17, 2019
Messages
18 (0.01/day)
Location
Hungary
System Name DarkTower
Processor AMD Ryzen 7 5800X3D
Motherboard MSI B550 MAG Tomahawk
Cooling ALPENFÖHN Brocken 3
Memory G.SKILL 32GB Ripjaws V DDR4 3600MHz CL16 KIT F4-3600C16D-16GVKC / 20528714217
Video Card(s) Sapphire Pulse 7900XT 20GB
Storage SanDisk SSD Ultra 3D 250 GB for system and 2TB +3TB Toshiba HDDs (DT01ACA200 + DT01ACA300) for data
Display(s) 27" QHD ViewSonic VX2780J-2K
Case Be Quiet! Dark Base 900
Audio Device(s) Integrated Realtek® ALC1200 / ALC1220P Codec
Power Supply Corsair HX620W modular
Mouse Gigabyte Force M7 Thor
Keyboard Kolink KBK3203C
Software Windows 10 Pro
Joined
Mar 23, 2016
Messages
4,841 (1.53/day)
Processor Core i7-13700
Motherboard MSI Z790 Gaming Plus WiFi
Cooling Cooler Master RGB something
Memory Corsair DDR5-6000 small OC to 6200
Video Card(s) XFX Speedster SWFT309 AMD Radeon RX 6700 XT CORE Gaming
Storage 970 EVO NVMe M.2 500GB,,WD850N 2TB
Display(s) Samsung 28” 4K monitor
Case Phantek Eclipse P400S
Audio Device(s) EVGA NU Audio
Power Supply EVGA 850 BQ
Mouse Logitech G502 Hero
Keyboard Logitech G G413 Silver
Software Windows 11 Professional v23H2
I believe TSX was disabled later on, at least on some of the Haswell SKUs.
My 4790K only had TSX enabled for a few months after purchase then a microcode update disabled the feature.
 
Joined
Aug 20, 2007
Messages
21,463 (3.40/day)
System Name Pioneer
Processor Ryzen R9 9950X
Motherboard GIGABYTE Aorus Elite X670 AX
Cooling Noctua NH-D15 + A whole lotta Sunon and Corsair Maglev blower fans...
Memory 64GB (4x 16GB) G.Skill Flare X5 @ DDR5-6000 CL30
Video Card(s) XFX RX 7900 XTX Speedster Merc 310
Storage Intel 905p Optane 960GB boot, +2x Crucial P5 Plus 2TB PCIe 4.0 NVMe SSDs
Display(s) 55" LG 55" B9 OLED 4K Display
Case Thermaltake Core X31
Audio Device(s) TOSLINK->Schiit Modi MB->Asgard 2 DAC Amp->AKG Pro K712 Headphones or HDMI->B9 OLED
Power Supply FSP Hydro Ti Pro 850W
Mouse Logitech G305 Lightspeed Wireless
Keyboard WASD Code v3 with Cherry Green keyswitches + PBT DS keycaps
Software Gentoo Linux x64 / Windows 11 Enterprise IoT 2024
Top