Most Viewed Content:

New Apple AirPods patent can monitor the wearer’s brainwaves and other biosignals

According to the latest list published by the United...

Arc Browser will be available on Windows 10 and Windows 11 platforms in June at the earliest

Arc Browser is based on Chromium, in macOS platform...

Microsoft releases Copilot, Windows 11 artificial intelligence personal assistant

Microsoft today announced at its annual Build developer conference...

Report details ÆPIC Leak security vulnerabilities affecting Intel’s 10/11/12 generation Core processors

Side-channel attacks against Intel and AMD x86 CPUs have intensified in recent years following the exposure of the Spectre and Meltdown vulnerabilities. On Tuesday, Intel pushed out microcode update 20220809 to patch the Intel-SA-00657 security vulnerability that affects a large number of processors, including 10/11/12 generation Cores. Shortly after, we saw a detailed analysis of the report.

The vulnerability is called ÆPIC Leak, which is named after the Advanced Programmable Interrupt Controller (APIC) that handles interrupt requests, and is the first CPU architecture-level sensitive data disclosure vulnerability.

It is known that on most Gen 10, 11, and 12 Core processors, APIC MMIO does not impose proper scope definitions on stale data returned from the cache hierarchy.

1.jpg

Compared to transient execution attacks such as Spectre and Meltdown, the ÆPIC Leak vulnerability is much closer to the architecture level — sensitive data can be leaked directly, without relying on any noisy side channels.

In other words, ÆPIC Leak is like uninitialized memory read in the CPU proper. Thankfully, access to APIC MMIO will require specific privileges (administrator or root), so most systems will not be directly affected by this vulnerability.

On the other hand, systems that rely on Intel SGX Software Protection Extensions to protect data from privileged attacks will be at greater risk — a key reason why Intel is aggressively pushing CPU microcode patches.

Demo 2.gif

A concept demo of the vulnerability is now open-sourced by the Graz Institute of Technology (GitHub). As for Intel, the chip giant became aware of it in December 2021 and assigned a generic vulnerability disclosure number, CVE-2022-21233.

Finally, if you do not deploy the 20220809 CPU microcode update first, you can also temporarily avoid exploits based on this vulnerability by disabling APIC MMIO or bypassing SGX.

Latest

Starting from 48,900, Geely Panda Karting officially starts pre-sale

Geely Panda Karting officially started pre-sale. The pre-sale price...

Ford: Expand charging network, fuel/ hybrid/ pure electric in parallel

Recently, Ford released the company's comprehensive annual report for...

Chery’s two new cars are exposed, targeting overseas markets

Recently, some media exposed the actual cars of two...

New Trumpchi Shadow Leopard to launch on May 1, upgraded performance rims

Recently, we learned from the official that the 2024...

Newsletter

Don't miss

Starting from 48,900, Geely Panda Karting officially starts pre-sale

Geely Panda Karting officially started pre-sale. The pre-sale price...

Ford: Expand charging network, fuel/ hybrid/ pure electric in parallel

Recently, Ford released the company's comprehensive annual report for...

Chery’s two new cars are exposed, targeting overseas markets

Recently, some media exposed the actual cars of two...

New Trumpchi Shadow Leopard to launch on May 1, upgraded performance rims

Recently, we learned from the official that the 2024...

Samsung Galaxy S25 Ultra expected to feature 5000mAh + 45W Combo

Technology media WccFtech recently reported that Samsung will not...
Sana
Sanahttps://www.techgoing.com
TechGoing is a global tech media to brings you the latest technology stories, including smartphones, electric vehicles, smart home devices, gaming, wearable gadgets, and all tech trending.