Friday, June 14, 2024

MDS Attacks – All Intel CPU’s Vulnerable to New RIDL and Fallout Attacks That Allow Hackers to Leak Confidential Data

Security researchers discovered a new wave of hardware-based critical side-channel vulnerabilities in Intel CPUs also called as MDS Attacks affected Tens of Millions of Modern Intel CPU ‘s in wide.

The combined of RIDL and Fallout speculative execution attacks in Intel CPU’s let attackers leak confidential data from the vulnerable systems.

Confidential data can be leaked across arbitrary security boundaries by Exploiting this Microarchitectural Data Sampling (or MDS), a combined Side channel vulnerabilities in real-world settings such as cloud and browsers.

MDS Attacks worse than recently uncovered such as Spectre, Meltdown, and Foreshadow which was intended to leaking data from the CPU caches.

But RIDL and Fallout collect data from internal CPU buffers and the method of exploiting this vulnerability named as “Microarchitectural Data Sampling” (MDS) by Intel.

MDS attacks mainly targeting CPU-internal buffers such as Line Fill Buffers, Load Ports, Store Buffers and leak arbitrary in-flight data.

Multiple teams of researchers have been disclosed this MDS attacks which combined of 3 side-channel attacks and ZombieLoad exploit.

One of the side channel vulnerability called RIDL allows attackers to MDS vulnerabilities to mount practical attacks and leak sensitive data from different internal CPU buffers.

Here the researchers demonstrated the leaking the root password hash from an unprivileged user, sensitive data from the Linux OS kernel, and JavaScript.

Another Side channel attack called Fallout allows attackers can leak data from Store Buffers, which are used every time a CPU pipeline needs to store any data.

It allow an unprivileged attacker can then later pick which data they leak from the CPU’s Store Buffer.

The ZombieLoad attack allows stealing sensitive data and keys while the computer accesses them.

According to the research, “While programs normally only see their own data, a malicious program can exploit the fill buffers to get hold of secrets currently processed by other running programs. These secrets can be user-level secrets, such as browser historywebsite contentuser keys, and passwords, or system-level secrets, such as disk encryption keys.”

Researchers also developed a dedicated MDS tool for Windows, Linux to verify whether your system is vulnerable.

Following CVEs assigned for MSD vulnerabilities,

CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
CVE-2018-12127: Microarchitectural Load Port Data Sampling (MLPDS)
CVE-2018-12130: Microarchitectural Fill Buffer Data Sampling (MFBDS)
CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory

You can also Download Free E-book to learn about complete Enterprise Security Implementation & Attack Mitigation Steps – Download Free-Ebook Here.


Latest articles

SolarWinds Serv-U Vulnerability Let Attackers Access sensitive files

SolarWinds released a security advisory for addressing a Directory Traversal vulnerability which allows a...

Smishing Triad Hackers Attacking Online Banking, E-Commerce AND Payment Systems Customers

Hackers often attack online banking platforms, e-commerce portals, and payment systems for illicit purposes.Resecurity...

Threat Actor Claiming Leak Of 5 Million Ecuador’s Citizen Database

A threat actor has claimed responsibility for leaking the personal data of 5 million...

Ascension Hack Caused By an Employee Who Downloaded a Malicious File

Ascension, a leading healthcare provider, has made significant strides in its investigation and recovery...

AWS Announced Malware Detection Tool For S3 Buckets

Amazon Web Services (AWS) has announced the general availability of Amazon GuardDuty Malware Protection...

Hackers Exploiting MS Office Editor Vulnerability to Deploy Keylogger

Researchers have identified a sophisticated cyberattack orchestrated by the notorious Kimsuky threat group.The...

0-day Vulnerability In 10,000 Web Apps Exploited Using XSS Payloads

A significant vulnerability, tracked as CVE-2024-37629, has been discovered in SummerNote 0.8.18. It allows...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles