Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Newer Intel CPUs Vulnerable to Variant 2 of ZombieLoad Attack

ZombieLoad version 2

Researchers have disclosed a new variant of the attack method dubbed ZombieLoad, which appears to also impact Intel CPUs that are not affected by the first variant of ZombieLoad.

ZombieLoad version 2

Researchers have disclosed a new variant of the attack method dubbed ZombieLoad, which appears to also impact Intel CPUs that are not affected by the first variant of ZombieLoad.

In May, a team of researchers, including experts who brought to light the existence of speculative execution side-channel vulnerabilities such as Meltdown and Spectre, disclosed several new flaws affecting Intel processors. These new attack methods rely on Microarchitectural Data Sampling (MDS) vulnerabilities and they have been dubbed ZombieLoad, RIDL and Fallout.

The MDS vulnerabilities can be exploited by a malicious application to obtain potentially sensitive information from other apps, the operating system, and virtual machines. The attacks work against both PCs and cloud environments, and they can be leveraged to obtain information such as passwords, website content, disk encryption keys and browser history.

When they first disclosed the MDS vulnerabilities, researchers said they impacted most Intel CPUs made in the past decade, but they did not affect some of the newer processors. However, the same researchers revealed on Tuesday that they have also uncovered a second variant of the ZombieLoad attack, which works against CPUs that include hardware mitigations against MDS attacks.

According to the experts, ZombieLoad Variant 2 also works against Intel Xeon Gold server processors with Cascade Lake microarchitecture and Core i9 processors with Coffee Lake microarchitecture.

ZombieLoad Variant 2, tracked as CVE-2019-11135, is related to Intel’s Transactional Synchronization Extensions (TSX), which is designed to improve performance for multi-threaded software. ZombieLoad Variant 2, which Intel has described as a Transactional Asynchronous Abort (TAA) vulnerability, affects all CPUs that support TSX and have the TAA_NO bit set to 0.

Advertisement. Scroll to continue reading.

Researchers reported ZombieLoad Variant 2 to Intel on April 23 and informed the company that the attack works against newer CPUs on May 10, just days before details of the original ZombieLoad attack were made public. However, Intel asked them not to disclose the details of Variant 2 until now. The original research paper describing ZombieLoad has now been updated to include information on the second variant as well.

Intel is working on microcode updates that should address the vulnerability and in the meantime it has provided mitigation advice for operating system developers, virtual machine manager (VMM) developers, developers of software using Intel SGX, and system administrators.

The tech giant says it has patched a total of 77 vulnerabilities this month, including 67 issues discovered internally.

Linux kernel developers, VMware, Microsoft, Red Hat and others have released advisories for their customers to inform them about the impact of ZombieLoad Variant 2 and provide mitigations.

Related: Intel Patches Serious Vulnerability in Processor Diagnostic Tool

Related: Millions of Devices With Intel CPUs Exposed to SWAPGS Attack

Written By

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Malwarebytes has named Chung Ip as Chief Financial Officer.

Semperis has appointed John Podboy as Chief Information Security Officer.

Randy Menon has become Chief Product and Marketing Officer at One Identity.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.