Friday, March 29, 2024

Intel Processors Vulnerability Allows Normal User Programs To Access The Protected Memory in the Kernel

Intel Processors Critical hardware design flaw that Presented in kernel level mode has been affected both Windows and Linux Kernels which leads to abuse the most sensitive kernel level privileges by Attackers.

This Critical Kernal vulnerability affected all operating systems including Windows, Linux, macOS which leads to slow down the process atleast five to 30 percentage.

It is presented in all recent Intel Processors and significantly allows normal users to access the protected memory in the kernel.

The kernel inside a chip is basically an invisible process that facilitates the way apps and functions work on your computer.

It has complete control over your operating system. Your PC needs to switch between user mode and kernel mode thousands of times a day.

This Critical vulnerability existing in Intel x86 CPUs produced over the past 10 years and initially, this flaw reported only in Intel Based chips

But Intel responded that these exploits are caused by a “bug” or a “flaw” and are unique to Intel products are incorrect. Based on the analysis to date, many types of computing devices — with many different vendors’ processors and operating systems — are susceptible to these exploits.

Also Read: phpMyAdmin CSRF Vulnerability Allows An Attacker to Delete Records From Database

What is the Major Impact of this Kernel Vulnerability

This Kernel Vulnerability categorized as an extremely technical flaw in the kernel which affected in not only the Intel-based processors but other vendors such as AMD, ARM also affected.

In this flaw allows chip’s kernel is leaking memory that could be accessed by user mode priviaged users can interact with kernel and sensitive data can be exposed by attackers.

Even more, an attacker can able to install the normal program on the computer and later they can read the password that is stored in kernel memory that has been encrypted with the private key.

Since a kernel is the core of an operating system, It’s a process that handles the most sensitive tasks in your system. so it considered as one of the serious flaws that should be fixed by the operating systems vendors and hardware vendors.

Intel said Intel and other technology companies have been made aware of new security research describing software analysis methods that, when used for malicious purposes, have the potential to improperly gather sensitive data from computing devices that are operating as designed,”

“Intel believes these exploits do not have the potential to corrupt, modify or delete data.” AMD  denied that its chips are affected.

According toThe Rigister, A fundamental design flaw in Intel’s processor chips has forced a significant redesign of the Linux and Windows kernels to defang the chip-level security bug.
Programmers are scrambling to overhaul the open-source Linux kernel’s virtual memory system. Meanwhile, Microsoft is expected to publicly introduce the necessary changes to its Windows operating system in an upcoming Patch Tuesday.

Since its a highly technical security Kernel Vulnerability users cannot perform any mitigation.so all the users urged to check with your operating system vendor or system manufacturer and apply any available updates as soon as they are available.

Website

Latest articles

How to Analyse .NET Malware? – Reverse Engineering Snake Keylogger

Utilizing sandbox analysis for behavioral, network, and process examination provides a foundation for reverse...

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles