- The new class of vulnerabilities in Intel processors arises from speculative technologies that anticipate individual computing steps.
- Openings enable gradual reading of entire privilege memory contents of shared processor (CPU).
- All Intel processors from the last 6 years are affected, from PCs to servers in data centres.
Intel has already deployed a fix for this in the 13th and 14th gen by permanently damaging the chip and crashing. Checkmate hackers.
Another day, another speculative execution vulnerability.
This vulnerability fundamentally undermines data security, particularly in the cloud environment where many users share the same hardware resources.
Intel gets punched again.
Anyone having a link to a more technical (detailed) description?
This is quite novice orientated and I’d be very interested on how it actually works. Is there anything already disclosed?Edit: link at the end to the original research/more detailed explanation:
https://comsec.ethz.ch/research/microarch/branch-privilege-injection/No catchy name for the vulnerability? It can’t be that bad, then…
Let’s call it Son of Spectre
Finally! I’ve been waiting to expose my processor
Exhibitionist, eh?
Intel Exhibitionist
Intel Outside