Article 4MRCT Silent Windows update patched side channel that leaked data from Intel CPUs

Silent Windows update patched side channel that leaked data from Intel CPUs

by
Dan Goodin
from Ars Technica - All content on (#4MRCT)
intel-core-i5-3210M-800x600.jpg

Enlarge / An uncovered Intel Core i5-3210M (BGA) inside of a laptop. (credit: Kif3)

Microsoft last month pushed a silent update that mitigated a serious vulnerability in all CPUs Intel has introduced since 2012, researchers who discovered the flaw said Tuesday.

The vulnerability-discovered and privately reported to Intel 12 months ago-resided in every CPU Intel has introduced since at least its Ivy Bridge line of processors and possibly earlier, a researcher from security firm Bitdefender told Ars. By abusing a performance capability known as speculative execution, attackers could open a side channel that leaks encryption keys, passwords, private conversations, and other secrets that are normally off limits.

The attack demonstrated in a research paper published by Bitdefender is similar to those disclosed in January 2018 under the names Spectre and Meltdown. Patches Microsoft released around the same time largely blunted those attacks. Microsoft's advisory described the flaw occurring "when certain central processing units (CPU) speculatively access memory," without mentioning Intel or any other chip maker. Bitdefender researchers, meanwhile, said they tested two AMD chips and found no evidence either was affected.

Read 17 remaining paragraphs | Comments

index?i=nP7xEVkF8b0:tkGDhzwuMcQ:V_sGLiPB index?i=nP7xEVkF8b0:tkGDhzwuMcQ:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments