Security News > 2020 > June > CrossTalk: First Speculative Execution Attack Allowing Data Leaks Across Intel CPU Cores
Researchers have disclosed the details of a new speculative execution attack affecting many Intel processors, and they say this is the first vulnerability of this kind that allows hackers to obtain sensitive information across the cores of a CPU. The vulnerability was discovered by a team of researchers from Vrije Universiteit Amsterdam in the Netherlands and ETH Zurich in Switzerland.
They initially reported their findings to Intel in September 2018 and nearly one year later they informed the tech giant about the possibility of cross-core leaks.
The vulnerability, dubbed CrossTalk by the researchers and special register buffer data sampling by Intel, is related to the Microarchitectural Data Sampling flaws disclosed last year.
Exploitation works even against apps running in Intel SGX enclaves, which should protect data against attacks.
"With CrossTalk, we discovered that various instructions perform offcore requests to read data from a staging buffer shared between all the CPU cores. We observed that the staging buffer contains sensitive data, including the output of the hardware digital random number generator, and that such data can be leaked across cores using RIDL attacks," the researchers explained.
News URL
Related news
- 5 Actionable Steps to Prevent GenAI Data Leaks Without Fully Blocking AI Usage (source)
- Underground ransomware claims attack on Casio, leaks stolen data (source)
- Pokemon dev Game Freak confirms breach after stolen data leaks online (source)
- Troubled US insurance giant hit by extortion after data leak (source)
- Intel, AMD CPUs on Linux impacted by newly disclosed Spectre bypass (source)
- Interbank confirms data breach following failed extortion, data leak (source)
- Ford investgates alleged breach following customer data leak (source)
- Ford investigates alleged breach following customer data leak (source)
- Apple fixes two zero-days used in attacks on Intel-based Macs (source)