• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new intel cpu vulnerability 'indirector' exposes sensitive data

New Intel CPU Vulnerability ‘Indirector’ Exposes Sensitive Data

You are here: Home / General Cyber Security News / New Intel CPU Vulnerability ‘Indirector’ Exposes Sensitive Data
July 2, 2024

Modern-day CPUs from Intel, which includes Raptor Lake and Alder Lake, have been discovered vulnerable to a new side-channel attack that could be exploited to leak delicate data from the processors.

The attack, codenamed Indirector by security scientists Luyi Li, Hosein Yavarzadeh, and Dean Tullsen, leverages shortcomings determined in Indirect Department Predictor (IBP) and the Branch Goal Buffer (BTB) to bypass current defenses and compromise the security of the CPUs.

“The Oblique Department Predictor (IBP) is a components component in fashionable CPUs that predicts the concentrate on addresses of indirect branches,” the researchers observed.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“Oblique branches are handle move guidance whose goal address is computed at runtime, making them hard to predict precisely. The IBP makes use of a combination of world heritage and department tackle to predict the target handle of indirect branches.”

Cybersecurity

The thought, at its core, is to detect vulnerabilities in IBP to launch exact Branch Target Injection (BTI) attacks – aka Spectre v2 (CVE-2017-5715) – which focus on a processor’s oblique department predictor to outcome in unauthorized disclosure of info to an attacker with neighborhood consumer accessibility by using a aspect-channel.

This is completed by indicates of a custom resource called iBranch Locator that is made use of to find any indirect department, followed by carrying out precision specific IBP and BTP injections to execute speculative execution.

Intel, which was produced conscious of the results in February 2024, has considering the fact that knowledgeable other afflicted components/software distributors about the issue.

As mitigations, it is really proposed to make use of the Indirect Branch Predictor Barrier (IBPB) additional aggressively and harden the Branch Prediction Device (BPU) layout by incorporating more intricate tags, encryption, and randomization.

The investigate arrives as Arm CPUs have been located vulnerable to a speculative execution attack of their own termed TIKTAG that targets the Memory Tagging Extension (MTE) to leak details with over a 95% achievement price in less than four seconds.

The analyze “identifies new TikTag gizmos capable of leaking the MTE tags from arbitrary memory addresses through speculative execution,” researchers Juhee Kim, Jinbum Park, Sihyeon Roh, Jaeyoung Chung, Youngjoo Lee, Taesoo Kim, and Byoungyoung Lee said.

Cybersecurity

“With TikTag gizmos, attackers can bypass the probabilistic defense of MTE, increasing the attack success rate by close to 100%.”

In reaction to the disclosure, Arm said “MTE can present a restricted established of deterministic initial line defenses, and a broader established of probabilistic to start with line defenses, against precise courses of exploits.”

“However, the probabilistic qualities are not built to be a whole answer from an interactive adversary that is able to brute pressure, leak, or craft arbitrary Address Tags.”

Uncovered this short article intriguing? Stick to us on Twitter  and LinkedIn to go through additional special articles we submit.


Some sections of this post are sourced from:
thehackernews.com

Previous Post: «meta's 'pay or consent' approach faces e.u. competition rules scrutiny Meta’s ‘Pay or Consent’ Approach Faces E.U. Competition Rules Scrutiny
Next Post: How MFA Failures are Fueling a 500% Surge in Ransomware Losses how mfa failures are fueling a 500% surge in ransomware»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)
  • PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution
  • Securing Data in the AI Era
  • Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
  • Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
  • CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises
  • Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
  • Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord
  • Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods
  • What Security Leaders Need to Know About AI Governance for SaaS

Copyright © TheCyberSecurity.News, All Rights Reserved.