Sunday, March 26, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > A new exploit impacts Intel desktop, server, and mobile CPUs

A new exploit impacts Intel desktop, server, and mobile CPUs


Seda Nur Cinar Seda Nur Cinar
December 11, 2019
2 min read
A new exploit impacts Intel desktop, server, and mobile CPUs

Researchers detected a new exploit called Plundervolt impacting Intel desktop, server, and mobile CPUs by electrical manipulation on the scale of millivolts, which needs to be applied at the right microsecond.

Academics from three universities across Europe have discovered a new attack that impacts the integrity of data stored inside Intel SGX, a highly-secured area of Intel CPUs. Attackers tinker with the actual amount of electricity being fed to the chip; by this way, they trick it into giving up its innermost secrets.

Electrical manipulation at the right microsecond

Academics say that they can alter bits inside SGX to cause errors that can be exploited at a later point after the data has left the security of the SGX enclave. In addition to this, Plundervolt can be used to recover encryption keys or introduce bugs in previously secure software.

Intel published a full list of vulnerable CPUs. The company has also released microcode (CPU firmware), and BIOS updates today that address the Plundervolt attack. GitHub will release proof-of-concept code for reproducing attacks.

It’s a primitive but also quite sophisticated attack because it is an electrical manipulation on the scale of millivolts, which needs to be applied at exactly the right microsecond.

According to researchers, Intel can mitigate this exploit with updates at the BIOS and microcode level — the kind of thing that many users will never bother to go through with. However, they also note that fortunately, for critical systems, there will be a way to verify that the exploit has been patched when establishing a trusted connection with another device.

Installing security updates is recommended

Intel downplayed the seriousness of the attack, saying:

“We are aware of publications by various academic researchers that have come up with some interesting names for this class of issues, including ‘VoltJockey’ and ‘Plundervolt,’ it wrote in a blog post acknowledging the existence of the exploit. We are not aware of any of these issues being used in the wild, but as always, we recommend installing security updates as soon as possible.”

The researchers who discovered and documented Plundervolt hail from the U.K.’s University of Birmingham, Graz University of Technology in Austria, and KU Leuven in Belgium. They are presenting their paper at IEEE S&P 2020.

Source: 1  2

 

 

 

See more Cybersecurity News

A comprehensive guide to understanding Cybersecurity: What is Cybersecurity?


Tags: CPUIntelVulnerability
Seda Nur Cinar

Seda Nur Cinar

Seda Nur Cinar is the news editor of the Cloud7 News. With more than 8 years of Linux and cloud experience, Seda is a Linux and opensource enthusiast, security researcher and a web application developer.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
HCE announced Barcelona-based dedicated hosting and cloud servers

HCE announced Barcelona-based dedicated hosting and cloud servers

Related News

7 best practices and tools to use for Linux security

7 best practices and tools to use for Linux security

March 24, 2023 5:00 pm
CISA aims to identify vulnerabilities that attract ransomware

CISA aims to identify vulnerabilities that attract ransomware

March 22, 2023 2:10 pm
7 best cybersecurity schools

7 best cybersecurity schools

March 21, 2023 9:00 pm
OVHcloud purchases its first Quandela quantum computer

OVHcloud purchases its first Quandela quantum computer

March 21, 2023 8:10 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Recent News

  • Weekly round-up: 20-24 March
  • Podman Desktop – Containers & Kubernetes (Podcast #15 w/ Markus Eisele)
  • What is a Daemon in Linux?
  • 7 best practices and tools to use for Linux security
  • Photopea review: The best free Photoshop alternative for Linux

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • Artificial Intelligence
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About Us
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2023, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

© 2023, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.