Intel processors have become a playing ground for attackers, started with Meltdown and Spectre, followed by Microarchitectural Data Sampling (MDS) now ‘Cacheout’ another speculative execution vulnerability fetching the data from Intel processors just like its predecessors but with more defense abilities.
Cacheout is a speculative execution vulnerability in the modern Intel processors that were developed before October 2018. This attack was first discovered in Rogue In-Flight Data Load (RIDL) paper, by authors Stephan van Schaik, Cristiano Giuffrida, Alyssa Milburn, Pietro Frigo, Herbert Bos, Sebastian Österlund, and Herbert Bos. This attack extracts the data from the operating system using the buffer overflow attacks.
To explain clearly, our modern operating systems use Kernels and Stack Canaries, the former is used for randomizing the codes and data structures so the exact location of the data will not be easily revealed to the attacker, and the latter actually helps in creating a decoy for those data to detect attacks. However, with Cacheout both Kernels and Stack Canaries operation are brought to the day light and that’s how attackers can exploit the secured data inside the processors.
Cacheout is considered to be very critical by the researchers as it can bypass multiple boundaries, affecting hyper-threads, processors, virtual machines, user to kernel space, and even the Intel Security Guard Extensions (SGX).
The CVE for Cacheout attack is CVE-2020-0549: “L1D Eviction Sampling (L1Des) Leakage“, The CVE score is 6,5 medium.
Intel processors do contain a microarchitectural structures to store and process the data in transit. The attack allows a malicious application to push the processor data out from the L1-D cache to leaky buffers, then further extracting it outside of the victim’s system.
The below image shows how L1-D Cache, L2 Cache and Processor data read and write path.
This attack creates contention at L1-D cache to force the data out of it, then moves the same to L2 cache, and then TSX Asynchronous Abort, and then broadcasting the data.
The below image shows the secret and evicted cache set,
Intel has offered microcode updates, based on operating systems and hypervisors. Users can check for the Intel’s Security Advisory SA-00329 and their software based guidance for mitigating the attack.
Users are requested to keep their systems updated with the operating system and hypervisor updates. Please make sure, the patch revision number is greater or matching with the current revision number in the processors table.
Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…
Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…
Discover the top 11 log management tools for efficient system management and monitoring. Learn about…
Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…
Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…
Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…