Security flaw detected in Intel processors


London, Mar 11 (IANS): Computer scientists at Belgium's leading higher education and research university KU Leuven have once again exposed a security flaw in Intel processors that could allow an attacker to acquire sensitive information, such as the victim's fingerprints or passwords.

In the past couple of years, Intel had had to issue quite a few patches for vulnerabilities that computer scientists at KU Leuven have helped expose.

"All measures that Intel has taken so far to boost the security of its processors have been necessary, but they were not enough to ward off our new attack," said Jo Van Bulck from the Department of Computer Science at KU Leuven.

Like the previous attacks, the new technique - dubbed Load Value Injection - targets the 'vault' of computer systems with Intel processors: SGX enclaves.

"To a certain extent, this attack picks up where our Foreshadow attack of 2018 left off. A particularly dangerous version of this attack exploited the vulnerability of SGX enclaves, so that the victim's passwords, medical information, or other sensitive information was leaked to the attacker," Jo Van Bulck said in a statement released by KU Leuven on Tuesday.

"Load Value Injection uses that same vulnerability, but in the opposite direction: The attacker's data are smuggled - 'injected' - into a software programme that the victim is running on their computer. Once that is done, the attacker can take over the entire programme and acquire sensitive information, such as the victim's fingerprints or passwords."

The vulnerability was already discovered on April 4, 2019. Nevertheless, the researchers and Intel agreed to keep it a secret for almost a year. Responsible disclosure embargoes are not unusual when it comes to cybersecurity, although they usually lift after a shorter period of time.

"We wanted to give Intel enough time to fix the problem. In certain scenarios, the vulnerability we exposed is very dangerous and extremely difficult to deal with because, this time, the problem did not just pertain to the hardware: The solution also had to take software into account," Van Bulck said.

"Therefore, hardware updates like the ones issued to resolve the previous flaws were no longer enough. This is why we agreed upon an exceptionally long embargo period with the manufacturer," Van Bulck added.

The researcher said that Intel ended up taking extensive measures that force the developers of SGX enclave software to update their applications.

"However, Intel has notified them in time. End-users of the software have nothing to worry about: They only need to install the recommended updates," Van Bulck said.

"Our findings show, however, that the measures taken by Intel make SGX enclave software up to 2 to even 19 times slower," he added.

In 2018, when researchers at KU Leuven discovered a vulnerabiliy, their attack was dubbed Foreshadow.

In 2019, an attack, dubbed "Plundervolt", revealed another vulnerability. Intel has released updates to resolves both flaws.

  

Top Stories


Leave a Comment

Title: Security flaw detected in Intel processors



You have 2000 characters left.

Disclaimer:

Please write your correct name and email address. Kindly do not post any personal, abusive, defamatory, infringing, obscene, indecent, discriminatory or unlawful or similar comments. Daijiworld.com will not be responsible for any defamatory message posted under this article.

Please note that sending false messages to insult, defame, intimidate, mislead or deceive people or to intentionally cause public disorder is punishable under law. It is obligatory on Daijiworld to provide the IP address and other details of senders of such comments, to the authority concerned upon request.

Hence, sending offensive comments using daijiworld will be purely at your own risk, and in no way will Daijiworld.com be held responsible.