833-677-5848 sales@longevitytech.us

The vulnerabilities could allow hackers to gain access to sensitive data in a computer’s memory

The bad news: According to a report in ZDNet, the flaws, which Intel calls “L1 Terminal Fault” and researchers have grouped under the moniker “Foreshadow”, are similar in nature to the Spectre and Meltdown security holes that were uncovered earlier this year in billions of chips from both Intel and AMD. AMD says its products aren’t vulnerable to the Foreshadow flaws, so this time it’s only Intel’s central processing unit chips that appear to be affected.

The downside: Foreshadow could let hackers mount “side channel” attacks that give them access to the portion of a chip’s core memory that holds things like passwords and encryption keys. Machines running in the computing cloud and handling workloads for lots of different customers could be particularly vulnerable to such attacks.

The (slightly) better news: The researchers who found the security holes gave Intel a heads-up months ago, so it has had time to prepare software patches to minimize the risk of hackers exploiting the new vulnerabilities. With both Spectre and Meltdown, Intel had to scramble to take corrective action. Cloud computing vendors like Microsoft and Amazon have also been issuing notices about steps they’ve taken to minimize the threat Foreshadow poses to customers.

A lingering risk: Because Foreshadow, Spectre, and Meltdown are all hardware-based flaws, there’s no guaranteed fix short of swapping out the chips. But security experts say the weaknesses are incredibly hard to exploit and that there’s no evidence so far to suggest this year’s chipocalypse has led to a hacking spree. Still, if your computer offers you an urgent software upgrade, be sure to take it immediately.

The security holes were discovered independently by two teams of researchers. A team from KU Leuven, a university in Belgium, informed Intel of its findings on January 3, the day when the notorious Spectre and Meltdown vulnerabilities were disclosed to the public. The second team, comprising researchers from Israel-based Technion, University of Michigan, the University of Adelaide in Australia, and Australia-based CSIRO’s Data61, reported its findings to Intel on January 23.

The Foreshadow/L1TF vulnerabilities are CVE-2018-3615, which impacts Intel’s Software Guard Extensions (SGX); CVE-2018-3620, which impacts operating systems and System Management Mode (SMM); and CVE-2018-3646, which affects virtualization software and Virtual Machine Monitors (VMM).Foreshadow

Researchers first discovered the vulnerability affecting SGX, a feature in Intel processors designed to protect user data even if an attacker takes control of the entire system. SGX was believed to be resilient to speculative execution attacks, but experts have now demonstrated that an attacker can read memory protected by SGX.

“Making things worse, due to SGX’s privacy features, an attestation report cannot be linked to the identity of its signer. Thus, it only takes a single compromised SGX machine to erode trust in the entire SGX ecosystem,” researchers explained on a website set up for the Foreshadow vulnerabilities.

During its investigation into the cause of Foreshadow, Intel discovered the two other flaws, which are tracked as Foreshadow-Next Generation (NG). Foreshadow-NG attacks can allow malicious actors to read information from the L1 cache, including information associated with the SMM, the operating system’s kernel, and hypervisors.

Companies respond to Foreshadow

Microsoft has published both a security advisory describing the flaws and a blog post containing technical details. The company says it has released several updates that should mitigate Foreshadow on both consumer devices and on its Azure cloud services.

Google also says it has deployed mitigations to its infrastructure, including for the infrastructure that underpins its cloud services.

Amazon Web Services (AWS) told customers that its infrastructure includes protections for these types of attacks, and additional security mechanisms have been deployed for L1TF. “All EC2 host infrastructure has been updated with these new protections, and no customer action is required at the infrastructure level,” AWS said.

Oracle has also published a blog post describing which of its products are impacted and which are not, and provided instructions on how attacks can be mitigated.

VMware has published separate advisories for CVE-2018-3646 and CVE-2018-3620. The former affects VMware vSphere, Workstation, and Fusion, and the company says it has released updates that patch the issue. The latter impacts vCloud Usage Meter (UM), Identity Manager (vIDM), vCenter Server (vCSA), vSphere Data Protection (VDP), vSphere Integrated Containers (VIC) and vRealize Automation (vRA). Patches are pending for this vulnerability, but virtual appliance mitigations are available.

Cisco is also working on patches for the vulnerabilities. The networking giant says that while its products are not directly affected, they could still be targeted if the hosting environment is vulnerable.

“Cisco recommends that customers harden their virtual environments, tightly control user access, and ensure that all security updates are installed. Customers who are deploying products as a virtual device in multi-tenant hosting environments should ensure that the underlying hardware, as well as the operating system or hypervisor, is patched against the vulnerabilities in question,” the company said.

The Xen Project revealed that systems running any version of Xen are impacted.

“New microcode, and possibly a new firmware image is required to prevent SMM data from being leaked with this vulnerability,” Xen developers explained. “Software updates to Xen (details below) are required to prevent guests from being able to leak data belonging to Xen or to other guests in the system.”

Red Hat has published both technical and high level materials describing the Foreshadow flaws. The company is working on updates that should make it easier for its users to implement mitigations.

The list of Linux distributions that have also published advisories includes Suse, Debian, Gentoo and Ubuntu.


via Intel’s ‘Foreshadow’ flaws are the latest sign of the chipocalypse – MIT Technology Review

Share This