Wednesday, April 30, 2025
HomeComputer SecurityPlundervolt Attack Let Hackers Access the Sensitive Data Stored Inside Secure Area...

Plundervolt Attack Let Hackers Access the Sensitive Data Stored Inside Secure Area of Intel CPUs

Published on

SIEM as a Service

Follow Us on Google News

Plundervolt Attack is a new Intel CPU based attack that can break the security mechanism of Intel CPUs by abusing privileged dynamic voltage scaling interfaces.

Security researchers at the University of Birmingham identified a new attack dubbed Plundervolt targeting Intel Software Guard Extensions (Intel SGX). Intel SGX is a set of instructions that enhances the application code and data.

The vulnerability was disclosed to Intel on 7, 2019 and it can be tracked as CVE-2019-11157. It affects all the Intel Core processors starting from Skylake. The vulnerability was addressed by Intel on the Tuesday patch of December.

- Advertisement - Google News

How the Plundervolt Attack Works

Modern processors to perform function faster than before, on the other hand, it requires a lot of power and increases the heat. To manage the power and heat chip providers allow frequency and voltage to be adjusted through software interfaces.

With the Plundervolt researchers shows that “software interfaces can be exploited to undermine the system’s security.” They able to “corrupt the integrity of the Intel SGX on Intel Core processors by controlling the voltage when executing enclave computations.”

This attack can even bypass the Intel SGX’s memory encryption/authentication technology that used to protect the data in the enclaves.

Plundervolt Attack assumes that attackers already having complete control over the software that running outside of the enclave including the operating system and BIOS.

A remote attacker can execute the attack and no physical access is required as the undervolting (the process used to control computer processors and components dynamically on runtime) interface is accessible from the software.

The first step of the attack is the fault injection into SGX enclaves, researchers analyzed several x86 assembly instructions and they found multiplications can be faulted.

Researchers observed that the required undervolting to reach a faulty state depends (as expected) on the CPU temperature.

Next to that, the feasibility of fault injection is investigated, researchers able to researchers able to apply their “undervolting techniques to inject faults in Intel SGX’s hardware-level key derivation instructions.”

In addition to memory consumption, the paper published by researchers also shows that Plundervolt can also cause memory safety misbehavior in certain situations.

Mitigations

If you are not using SGX, then nothing to worry about this, if you are using it Intel has provided a microcode update along with the BIOS update.

Intel released an advisory INTEL-SA-00289, “we worked on with multiple academic researchers that affect client systems, and some Xeon E based platforms. We are not aware of any of these issues being used in the wild, but as always, we recommend installing security updates as soon as possible.”

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Link11 brings three brands together on one platform with new branding

Link11 has fully integrated DOSarrest and Reblaze to become one of Europe's leading providers...

Incident Response Playbooks – What Every CISO Should Have Ready

The Security Operations Center (SOC) is the nerve center of modern cybersecurity, responsible for...

The Role of CISOs in Managing Emerging Cybersecurity Threats Post-Pandemic

The Chief Information Security Officer (CISO) has emerged as one of the most critical...

Zimbra Collaboration GraphQL Flaw Lets Hackers Steal User Information

 A severe Cross-Site Request Forgery (CSRF) vulnerability in Zimbra Collaboration Suite (ZCS) versions 9.0...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Incident Response Playbooks – What Every CISO Should Have Ready

The Security Operations Center (SOC) is the nerve center of modern cybersecurity, responsible for...

Researchers Exploit OAuth Misconfigurations to Gain Unrestricted Access to Sensitive Data

A security researcher has uncovered a serious vulnerability resulting from incorrectly configured OAuth2 credentials...

AWS Defaults Open Stealthy Attack Paths Enabling Privilege Escalation and Account Compromise

A recent investigation by security researchers has exposed critical vulnerabilities in the default IAM...