Saturday, March 1, 2025
HomeSecurity NewsIntel Processors Vulnerability Allows Normal User Programs To Access The Protected Memory...

Intel Processors Vulnerability Allows Normal User Programs To Access The Protected Memory in the Kernel

Published on

SIEM as a Service

Follow Us on Google News

Intel Processors Critical hardware design flaw that Presented in kernel level mode has been affected both Windows and Linux Kernels which leads to abuse the most sensitive kernel level privileges by Attackers.

This Critical Kernal vulnerability affected all operating systems including Windows, Linux, macOS which leads to slow down the process atleast five to 30 percentage.

It is presented in all recent Intel Processors and significantly allows normal users to access the protected memory in the kernel.

The kernel inside a chip is basically an invisible process that facilitates the way apps and functions work on your computer.

It has complete control over your operating system. Your PC needs to switch between user mode and kernel mode thousands of times a day.

This Critical vulnerability existing in Intel x86 CPUs produced over the past 10 years and initially, this flaw reported only in Intel Based chips

But Intel responded that these exploits are caused by a “bug” or a “flaw” and are unique to Intel products are incorrect. Based on the analysis to date, many types of computing devices — with many different vendors’ processors and operating systems — are susceptible to these exploits.

Also Read: phpMyAdmin CSRF Vulnerability Allows An Attacker to Delete Records From Database

What is the Major Impact of this Kernel Vulnerability

This Kernel Vulnerability categorized as an extremely technical flaw in the kernel which affected in not only the Intel-based processors but other vendors such as AMD, ARM also affected.

In this flaw allows chip’s kernel is leaking memory that could be accessed by user mode priviaged users can interact with kernel and sensitive data can be exposed by attackers.

Even more, an attacker can able to install the normal program on the computer and later they can read the password that is stored in kernel memory that has been encrypted with the private key.

Since a kernel is the core of an operating system, It’s a process that handles the most sensitive tasks in your system. so it considered as one of the serious flaws that should be fixed by the operating systems vendors and hardware vendors.

Intel said Intel and other technology companies have been made aware of new security research describing software analysis methods that, when used for malicious purposes, have the potential to improperly gather sensitive data from computing devices that are operating as designed,”

“Intel believes these exploits do not have the potential to corrupt, modify or delete data.” AMD  denied that its chips are affected.

According toThe Rigister, A fundamental design flaw in Intel’s processor chips has forced a significant redesign of the Linux and Windows kernels to defang the chip-level security bug.
Programmers are scrambling to overhaul the open-source Linux kernel’s virtual memory system. Meanwhile, Microsoft is expected to publicly introduce the necessary changes to its Windows operating system in an upcoming Patch Tuesday.

Since its a highly technical security Kernel Vulnerability users cannot perform any mitigation.so all the users urged to check with your operating system vendor or system manufacturer and apply any available updates as soon as they are available.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Hacktivist Groups Emerge With Powerful Tools for Large-Scale Cyber Operations

Hacktivism, once synonymous with symbolic website defacements and distributed denial-of-service (DDoS) attacks, has evolved...

New Pass-the-Cookie Attacks Bypass MFA, Giving Hackers Full Account Access

Multi-factor authentication (MFA), long considered a cornerstone of cybersecurity defense, is facing a formidable...

Chinese Hackers Exploit Check Point VPN Zero-Day to Target Organizations Globally

A sophisticated cyberespionage campaign linked to Chinese state-sponsored actors has exploited a previously patched...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research...

Threat Actors Trojanize Popular Games to Evade Security and Infect Systems

A sophisticated malware campaign was launched by cybercriminals, targeting users through trojanized versions of...