Amd cpus11/13/2023 "While this certainly increases the known attack surface, it remains to be seen whether practical exploitation is possible on Intel CPUs," he said. Their analysis found that Intel CPUs are vulnerable to the prediction manipulation tactic. Razavi said his team is currently evaluating if other CPU vendors are vulnerable to the same flaw. On discovering the vulnerability, the researchers said, they alerted AMD, which disabled prediction return in the kernel. Kaveh Razavi, the lead research supervisor, said the attack is particularly dangerous for cloud computing platforms on which several customers share the same hardware.Īlthough the vulnerability has not been exploited previously, Razavi said hackers can potentially adopt the tactics to conduct monthslong stealth operations, since exploitation at kernel level is harder to detect and mitigate. This further allowed the researchers to leak data from "anywhere in the computer’s memory," including the kernel. Researchers were able to inject new predictions, tricking the processor into believing the predictions were instructions it had seen before, which allowed the researchers to bypass security checks that earlier ensured only trustworthy predictions would be processed. Computer processors use branch prediction to speed up calls to memory, which are relatively slow. To exploit the flaw, the researchers chained an older AMD vulnerability called Phantom Speculation that causes AMD processors to make a wrong branch predictor - that is, to force the computer to make an incorrect guess about the next instruction to execute. "Our results show that we are able to successfully leak the root password hash in all 10 runs, in a median of 11 minutes and 38 seconds," the report says. When exploited, the flaw allows attackers to inject code that will make the targeted devices misinterpret data, causing data leaks from the processor, a new paper from security researchers at Swiss university ETH Zürich finds. With up to 8 cores, delivers modern performance, security features, and seamless management for the most demanding business. The researchers named the flaw after the 2010 movie of the same name, since both the hacking technique and the film's plot involve planting false ideas into memory. The AMD Ryzen 5 5600X is a fantastic processor, aimed at gamers, creators, and even those looking for a solid mid-range CPU that won't destroy your budget. The flaw, tracked as CVE-2023-20569, and dubbed "Inception," affects all versions of AMD Zen computer processing unit. See Also: Live Webinar | Unmasking Pegasus: Understand the Threat & Strengthen Your Digital Defense If you see inaccuracies in our content, please report the mistake via this form.Security researchers uncovered a vulnerability in Advanced Micro Devices chips that could allow hackers to trick a computer system into leaking data from its kernel. The AMD processor runs on new 1331 pin AM4 socket motherboards shared by FX models in high-end systems as well as APU models. If we have made an error or published misleading information, we will correct or clarify the article. Our editors thoroughly review and fact-check every article to ensure that our content meets the highest standards. Our goal is to deliver the most accurate information and the most knowledgeable advice possible in order to help you make smarter buying decisions on tech gear and a wide array of products and services. ZDNET's editorial team writes on behalf of you, our reader. Indeed, we follow strict guidelines that ensure our editorial content is never influenced by advertisers. Neither ZDNET nor the author are compensated for these independent reviews. This helps support our work, but does not affect what we cover or how, and it does not affect the price you pay. When you click through from our site to a retailer and buy a product or service, we may earn affiliate commissions. And we pore over customer reviews to find out what matters to real people who already own and use the products and services we’re assessing. We gather data from the best available sources, including vendor and retailer listings as well as other relevant and independent reviews sites. ZDNET's recommendations are based on many hours of testing, research, and comparison shopping.
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |