All Intel CPUs since 2013 hit by Zombieload v2 vulnerability

Posted on Wednesday, November 13 2019 @ 16:18 CET by Thomas De Maesschalck
Intel
News about another Intel CPU vulnerability hit the web. Researchers disclosed a new variant of the Zombieload vulnerability and this second version affects all Intel processors since 2013 with the Intel TSX instruction set. The issue was discovered months ago but was kept secret to give Intel time to release a patch. Intel will address the vulnerability with yet another microcode update but users can also protect themselves by disabling TSX support.
Nicknamed Zombiload v2 (CVE-2019-11135), this is a variation of the Zombieload v1 vulnerability, but one that worked on Intel's newer line of CPUs, those which the company claimed had protections against speculative execution attacks baked in at the hardware level.

According to an updated version of the Zombieload academic paper that ZDNet received this week, the Zombieload v2 attack exploits the Intel Transactional Synchronization Extensions (TSX) Asynchronous Abort operation that occurs when an attacker uses malicious code to create a conflict between read operations inside a CPU.

This read conflict for TSX Asynchronous Abort (TAA) operations leaks data about what's being processed inside an Intel CPU.
Full details at ZD Net.


About the Author

Thomas De Maesschalck

Thomas has been messing with computer since early childhood and firmly believes the Internet is the best thing since sliced bread. Enjoys playing with new tech, is fascinated by science, and passionate about financial markets. When not behind a computer, he can be found with running shoes on or lifting heavy weights in the weight room.



Loading Comments