Friday, August 19, 2022
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > Intel and AMD CPUs can be attacked by an interesting technique

Intel and AMD CPUs can be attacked by an interesting technique

Researchers have found a way to exploit CPUs by measuring their power consumption in real-time.


Rusen Gobel Rusen Gobel
June 17, 2022
2 min read
Intel and AMD CPUs can be attacked by an interesting technique

Hardware-based vulnerabilities are often impossible to fix; the mitigations via software patches generally affect the performance of the hardware. Intel users have suffered from some issues with Spectre and Meltdown issues, and with their mitigations. Now, there seems to be a new security flaw affecting both Intel and AMD CPUs in all categories.

Voltage + frequency = bingo?

Security researchers have been investigating the possibility of extracting cryptographic data from a target CPU just by measuring the power consumption while it’s processing data. While those attempts did not lead anywhere, yet, the researchers have discovered another way to abuse the CPU’s power consumption data. According to the researchers, it is possible to track the time that server spends responding to specific queries by monitoring dynamic voltage and frequency scaling data. This flaw, which is named Hertzbleed, can be tracked as CVE-2022-24436 for Intel CPUs and CVE-2022-23823 for AMD ones. It affects the 8th – 11th generations of Intel Core, Xeon, and AMD Ryzen CPUs.

While Hertzbleed has two CVEs for two CPU brands, it is not a real threat in almost any cases. The data processing on CPUs can lead to many, many different possibilities, and processes run so fast, that it is practically impossible to extract any data by abusing voltage and frequency scaling data other than the CPU’s performance. Intel states that while this issue is interesting from a research perspective, they don’t believe that it will work outside a lab environment. Neither of the CPU companies will update their chips against this technique.

See more Cybersecurity News


Tags: Advanced Micro Devices (AMD)Intel

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post

WordPress plugin Ninja Forms is critically vulnerable

Related News

Janet Jackson's music video gets a CVE

Janet Jackson’s music video gets a CVE

August 19, 2022 1:45 pm
Feces delivery service hacked

Feces delivery service hacked

August 18, 2022 8:45 pm
Google patches zero-day vulnerability being exploited

Google patches zero-day vulnerability being exploited

August 18, 2022 8:20 pm
Hundreds of thousands of websites leaving .git folders accessible

Hundreds of thousands of websites leaving .git folders accessible

August 18, 2022 3:05 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Editor's Choice

Interview with Igor Seletskiy on AlmaLinux

7 best hosting control panels

How to update Linux Kernel without rebooting?

7 best Linux mail servers for 2022

7 best cPanel alternatives for 2022

7 best Linux web browsers for 2022

7 best CentOS alternatives

7 best Linux server distros for 2022

How to scan your server for Log4j (Log4Shell) vulnerability

10 Best Web Hosting Services of 2022

AlmaLinux 8.6 Stable is ready to download

Ubuntu 22.04 LTS is available for download. What is new?

Kali Linux 2022.2 is ready for download

Recent News

  • Janet Jackson’s music video gets a CVE
  • Ingram Micro Cloud launches ULTRA Membership Program
  • PowerToys is getting a new tool, PowerOCR
  • Feces delivery service hacked
  • Google patches zero-day vulnerability being exploited


Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2022, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

© 2022, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.