
A new type of Spectre, or security flaw, has been discovered in Intel processors. It works differently than the ones found earlier.
Spectre, a security flaw in processors, is a hardware-level defect which puts user data in risk as it lets hackers easily read user activity. It was first discovered in Intel processors and later in new AMD processors too, which means millions of devices, since the past two decades, have had this vulnerability.
Intel has released several software patches for people with ‘older’ processors as a workaround to the vulnerability, however, these patches significantly reduced the processors’ performance. Though the company had somewhat contained the earlier defect, a new Spectre variant, called Variant 4, has been found by Intel and Microsoft.
This time, the defect makes the same areas of data vulnerable, however, extracts this data in a different manner as compared to the previous flaw discovered in January, says Intel in a blog post. The company has released patches for the Variant 4, but these fixes will also cause performance hits.
Samsung Galaxy J8 Brings Infinity Display & Dual Cameras At Midrange Price
Medium Risk
Intel says that the Variant 4 exploit is “medium risk” in comparison because the company has already minimized the problem in the early patches. Additionally, this flaw uses a “Speculative Store Bypass”, which can cause a processor to send and store data in less-secure places. According to US-CERT’s advisory, this could allow attackers to access older instants of data.
Like the other GPZ variants, Variant 4 uses speculative execution, a feature common to most modern processor architectures, to potentially expose certain kinds of data through a side channel. In this case, the researchers demonstrated Variant 4 in a language-based runtime environment. While we are not aware of a successful browser exploit, the most common use of runtimes, like JavaScript, is in web browsers.
The company says that there has not been any breach by exploiting Variant 4 for now, it has launched a complete fix for this flaw which has already been made available to vendors and other manufacturers that use Intel chips.
Like the other GPZ variants, Variant 4 uses speculative execution, a feature common to most modern processor architectures, to potentially expose certain kinds of data through a side channel. In this case, the researchers demonstrated Variant 4 in a language-based runtime environment. While we are not aware of a successful browser exploit, the most common use of runtimes, like JavaScript, is in web browsers.
Comments
Post a Comment