Monday, June 24, 2024

Intel Processors Vulnerability Allows Normal User Programs To Access The Protected Memory in the Kernel

Intel Processors Critical hardware design flaw that Presented in kernel level mode has been affected both Windows and Linux Kernels which leads to abuse the most sensitive kernel level privileges by Attackers.

This Critical Kernal vulnerability affected all operating systems including Windows, Linux, macOS which leads to slow down the process atleast five to 30 percentage.

It is presented in all recent Intel Processors and significantly allows normal users to access the protected memory in the kernel.

The kernel inside a chip is basically an invisible process that facilitates the way apps and functions work on your computer.

It has complete control over your operating system. Your PC needs to switch between user mode and kernel mode thousands of times a day.

This Critical vulnerability existing in Intel x86 CPUs produced over the past 10 years and initially, this flaw reported only in Intel Based chips

But Intel responded that these exploits are caused by a “bug” or a “flaw” and are unique to Intel products are incorrect. Based on the analysis to date, many types of computing devices — with many different vendors’ processors and operating systems — are susceptible to these exploits.

Also Read: phpMyAdmin CSRF Vulnerability Allows An Attacker to Delete Records From Database

What is the Major Impact of this Kernel Vulnerability

This Kernel Vulnerability categorized as an extremely technical flaw in the kernel which affected in not only the Intel-based processors but other vendors such as AMD, ARM also affected.

In this flaw allows chip’s kernel is leaking memory that could be accessed by user mode priviaged users can interact with kernel and sensitive data can be exposed by attackers.

Even more, an attacker can able to install the normal program on the computer and later they can read the password that is stored in kernel memory that has been encrypted with the private key.

Since a kernel is the core of an operating system, It’s a process that handles the most sensitive tasks in your system. so it considered as one of the serious flaws that should be fixed by the operating systems vendors and hardware vendors.

Intel said Intel and other technology companies have been made aware of new security research describing software analysis methods that, when used for malicious purposes, have the potential to improperly gather sensitive data from computing devices that are operating as designed,”

“Intel believes these exploits do not have the potential to corrupt, modify or delete data.” AMD  denied that its chips are affected.

According toThe Rigister, A fundamental design flaw in Intel’s processor chips has forced a significant redesign of the Linux and Windows kernels to defang the chip-level security bug.
Programmers are scrambling to overhaul the open-source Linux kernel’s virtual memory system. Meanwhile, Microsoft is expected to publicly introduce the necessary changes to its Windows operating system in an upcoming Patch Tuesday.

Since its a highly technical security Kernel Vulnerability users cannot perform any mitigation.so all the users urged to check with your operating system vendor or system manufacturer and apply any available updates as soon as they are available.

Website

Latest articles

Threat Actor Claiming a 0-day in Linux LPE Via GRUB bootloader

A new threat actor has emerged, claiming a zero-day vulnerability in the Linux GRUB...

LockBit Ransomware Group Claims Hack of US Federal Reserve

The notorious LockBit ransomware group has claimed responsibility for hacking the U.S. Federal Reserve,...

Microsoft Power BI Vulnerability Let Attackers Access Organizations Sensitive Data

A vulnerability in Microsoft Power BI allows unauthorized users to access sensitive data underlying...

Consulting Companies to Pay $11 Million Failing Cybersecurity Requirements

Two consulting companies, Guidehouse Inc. and Nan McKay and Associates, have agreed to pay...

New RAT Malware SneakyChef & SugarGhost Attack Windows Systems

Talos Intelligence has uncovered a sophisticated cyber campaign attributed to the threat actor SneakyChef....

Chinese Winnti Group Intensifies Financially Motivated Attacks

Hackers are increasingly executing financially motivated attacks and all due to the lucrative potential...

PrestaShop Website Under Injection Attack Via Facebook Module

A critical vulnerability has been discovered in the "Facebook" module (pkfacebook) from Promokit.eu for...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles