A critical CPU vulnerability can pose a significant threat by allowing:-
Exploitation of such vulnerabilities can lead to widespread cyberattacks and significant disruptions.
Recently, Google noted a rise in CPU vulnerabilities this year, as August disclosures reveal the following vulnerabilities for the Intel and AMD CPUs:-
Besides this, Google recently identified a new CPU vulnerability affecting CPUs from both Intel and AMD, and this vulnerability has been tracked as “CVE-2023-23583,” which is dubbed “Reptar.”
The escalating trend of vulnerabilities poses a threat to billions of personal and cloud computers.
Google’s InfoSec team reported the flaw to Intel, who swiftly disclosed and mitigated the flaw with industry collaboration.
A Google researcher found CPU vulnerability in interpreting redundant prefixes, enabling security bypass. Prefixes modify instruction behavior; however, if conflicting or illogical, then they are termed redundant and often ignored.
Exploiting this flaw in a multi-tenant virtualized setup crashes the host, denying service to other guests. It may also risk information exposure or even privilege escalation as well.
Besides this, Google’s response team had already deployed the mitigation to their systems before it posed a risk to customers, especially those on Google Cloud and ChromeOS.
CVEID: CVE-2023-23583
Description: The sequence of processor instructions leads to unexpected behavior for some Intel(R) Processors that may allow an authenticated user to potentially enable escalation of privilege and/or information disclosure and/or denial of service via local access.
CVSS Base Score: 8.8
Severity: High
CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Impact of vulnerability: Escalation of Privilege, Denial of Service, Information Disclosure
Original release: 11/14/2023
Last revised: 11/14/2023
Here below, we have mentioned all the Intel products that are affected:-
Here below, we have mentioned all the products that have already been mitigated:-
These vulnerabilities (Reptar, Zenbleed, Downfall) highlight the ongoing and uprising trend of hardware vulnerabilities that are evolving at a rapid pace.
The evolution of these vulnerabilities also rapidly fuels up the threat complexity and makes mitigations harder; that’s why Google heavily investing in CPU research, collaborating closely for user safety.
Patch Manager Plus, the one-stop solution for automated updates of over 850 third-party applications: Try Free Trial.
Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…
The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ advanced…
A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to execute…
Meta has announced the removal of over 2 million accounts connected to malicious activities, including…
Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and content…
A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip, allowing…