{"id":179388,"date":"2018-08-17T14:19:06","date_gmt":"2018-08-17T19:19:06","guid":{"rendered":"https:\/\/www.ntegrait.com\/intel-chip-vulnerabilities-what-we-know-so-far\/"},"modified":"2024-02-06T13:50:13","modified_gmt":"2024-02-06T13:50:13","slug":"intel-chip-vulnerabilities-what-we-know-so-far","status":"publish","type":"post","link":"https:\/\/ntegrait.com\/intel-chip-vulnerabilities-what-we-know-so-far\/","title":{"rendered":"Intel Chip Vulnerabilities: What We Know So Far!"},"content":{"rendered":"

What Do We Know About Terminal Fault (L1TF) Chip Vulnerabilities?<\/h2>\n

\"L1<\/p>\n

Understanding The L1 Terminal Fault (L1TF)<\/h2>\n

Intel has recently confirmed L1 Terminal Fault (L1TF) chip vulnerabilities in its processors that can be manipulated by malware and malevolent virtual machines with the intention of stealing private information from a computer\u2019s memory.<\/p>\n

Who or What is Vulnerable?<\/strong><\/p>\n

In short, Intel\u2019s desktop, workstation, and server CPUs are exposed. What Intel initially described as impregnatable memory, has been found to have holes. That means sensitive data from other software and other customers\u2019 virtual machines can be stolen from malicious software and guest virtual machines either on a vulnerable device or a cloud platform.<\/p>\n

This private information may involve personal and financial accounts, passwords, and encryption keys. Also, they pose a threat to be taken from other customers\u2019 virtual machines, including both System Management Mode (SMM) memory and SGX enclaves.<\/p>\n

SGX, made by Intel technology, is intended to guard private information from code geared to peep and pry.<\/p>\n

SMM serves as a computer\u2019s clean-up operator. \u00a0This is an alternate software system that is usually placed in the computer\u2019s firmware. It also has total control over the computer\u2019s hardware and absolute admittance to all of its data.<\/p>\n

Let\u2019s break down the three areas, which Intel has named its L1 Terminal Fault (L1TF) bugs:<\/strong><\/p>\n

CVE-2018-3615<\/strong><\/p>\n

CVE-2018-3615 impacts Software Guard Extensions (SGX). More specifically, Intel says, \u201cSystems with microprocessors utilizing speculative execution and software guard extensions (Intel SGX) may allow unauthorized disclosure of information residing in the L1 data cache from an enclave to an attacker with local user access via side-channel analysis.\u201d The researching teams who discovered CVE-2018-3615, named the vulnerability, Foreshadow.<\/p>\n

The Fix:<\/strong><\/p>\n

Fixing this vulnerability will require the microcode update. To be safe, it is also recommended that you update your operating system and VM hypervisor. The patches should be available now for just about all operating systems.<\/p>\n

This bug was discovered by two different groups:<\/p>\n

    \n
  1. Jo Van Bulck, Frank Piessens, Raoul Strackx from imec-DistriNet \u2013 KU Leuven<\/a>.<\/li>\n
  2. Marina Minkin, Mark Silberstein from Technion<\/a>, Ofir Weisse, Daniel Genkin, Baris Kasikci, Thomas F. Wenisch from The University of Michigan<\/a>, and Yuval Yarom from University of Adelaide and CSIRO\u2019s Data61.<\/li>\n<\/ol>\n

    CVE-2018-3620 <\/strong><\/p>\n

    According to Intel<\/a>, \u201cSystems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and side-channel analysis.\u201d In short, CVE-2018-3620 affects operating systems and SMM.<\/p>\n

    The Fix:<\/strong><\/p>\n

    To fix this, operating system kernels will need to be patched. Also, the SMM needs the microcode update, to be safe.<\/p>\n

    CVE-2018-3646 <\/strong><\/p>\n

    Intel states<\/a>, \u201cSystems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and side-channel analysis.\u201d CVE-2018-3646 affects hypervisors and virtual machines.<\/p>\n

    The Fix:<\/strong><\/p>\n

    Fixing CVE-2018-3646 will require the microcode, operating system, and hypervisor updates in order to protect your data.<\/p>\n

    Extra Fix:<\/strong><\/p>\n

    The way hypervisor software operates is by allowing virtual machines or processors to be run off shared resources of a physical server. At the same time, they use multi-threading \u2013 a technique by which a single set of code can be used by several processors at different stages of implementation. Intel calls this Hyperthreading, and it can split one of its cores to act like two separate processors of the multi-core CPU for the hypervisor. This technique creates what Intel calls \u201csibling threads.\u201d<\/p>\n

    Since these threads share a pool of L1 cache memory attached to the core, a malicious guest, on one of the virtual processors, could manipulate the third variant of the L1 Terminal Fault and get data used by the other sibling thread.<\/p>\n

    Even though the virtual processor will recognize this and deny the request of the hacker, if the data is in the cache at the same time, it can be revealed to the hacker.<\/p>\n

    Both CVE-2018-3620 and CVE-2018-3646 were discovered by Intel\u2019s engineers after the university researchers who discovered \u201cForeshadow\u201d informed Intel about CVE-2018-3615, the SGX issue.<\/p>\n

    The Ultimate Fix<\/strong><\/p>\n

    The real fix to all these problems will be made by replacing the processors. As Intel stated, when addressing L1TF, \u201cThese changes begin with our next-generation Intel Xeon Scalable processors (code-named Cascade Lake), as well as new client processors expected to launch later this year.\u201d<\/p>\n

    For now, the best advice is to keep patching and be aware of any changes you see in the area of performance and speed with the patches.<\/p>\n","protected":false},"excerpt":{"rendered":"

    What Do We Know About Terminal Fault (L1TF) Chip Vulnerabilities? Understanding The L1 Terminal Fault (L1TF) Intel has recently confirmed L1 Terminal Fault (L1TF) chip vulnerabilities in its processors that can be manipulated by malware and malevolent virtual machines with the intention of stealing private information from a computer\u2019s memory. Who or What is Vulnerable?…<\/p>\n","protected":false},"author":5,"featured_media":158861,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[8],"tags":[65],"class_list":["post-179388","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-mediabytes"],"acf":[],"yoast_head":"\nIntel Chip Vulnerabilities: What We Know So Far! - IT Services in Virginia<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ntegrait.com\/intel-chip-vulnerabilities-what-we-know-so-far\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Intel Chip Vulnerabilities: What We Know So Far! - IT Services in Virginia\" \/>\n<meta property=\"og:description\" content=\"What Do We Know About Terminal Fault (L1TF) Chip Vulnerabilities? Understanding The L1 Terminal Fault (L1TF) Intel has recently confirmed L1 Terminal Fault (L1TF) chip vulnerabilities in its processors that can be manipulated by malware and malevolent virtual machines with the intention of stealing private information from a computer\u2019s memory. Who or What is Vulnerable?…\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ntegrait.com\/intel-chip-vulnerabilities-what-we-know-so-far\/\" \/>\n<meta property=\"og:site_name\" content=\"IT Services in Virginia\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-17T19:19:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-06T13:50:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ntegrait.com\/wp-content\/uploads\/2018\/08\/ThinkstockPhotos-478884007-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"507\" \/>\n\t<meta property=\"og:image:height\" content=\"338\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Steve West\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Steve West\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ntegrait.com\/intel-chip-vulnerabilities-what-we-know-so-far\/\",\"url\":\"https:\/\/www.ntegrait.com\/intel-chip-vulnerabilities-what-we-know-so-far\/\",\"name\":\"Intel Chip Vulnerabilities: What We Know So Far! - IT Services in Virginia\",\"isPartOf\":{\"@id\":\"https:\/\/www.ntegrait.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ntegrait.com\/intel-chip-vulnerabilities-what-we-know-so-far\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.ntegrait.com\/intel-chip-vulnerabilities-what-we-know-so-far\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ntegrait.com\/wp-content\/uploads\/2018\/08\/ThinkstockPhotos-478884007-1.jpg\",\"datePublished\":\"2018-08-17T19:19:06+00:00\",\"dateModified\":\"2024-02-06T13:50:13+00:00\",\"author\":{\"@id\":\"https:\/\/www.ntegrait.com\/#\/schema\/person\/33156c118f002b88019c3fc70441bf79\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.ntegrait.com\/intel-chip-vulnerabilities-what-we-know-so-far\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ntegrait.com\/intel-chip-vulnerabilities-what-we-know-so-far\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ntegrait.com\/intel-chip-vulnerabilities-what-we-know-so-far\/#primaryimage\",\"url\":\"https:\/\/ntegrait.com\/wp-content\/uploads\/2018\/08\/ThinkstockPhotos-478884007-1.jpg\",\"contentUrl\":\"https:\/\/ntegrait.com\/wp-content\/uploads\/2018\/08\/ThinkstockPhotos-478884007-1.jpg\",\"width\":507,\"height\":338},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ntegrait.com\/intel-chip-vulnerabilities-what-we-know-so-far\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ntegrait.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Intel Chip Vulnerabilities: What We Know So Far!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ntegrait.com\/#website\",\"url\":\"https:\/\/www.ntegrait.com\/\",\"name\":\"IT Services in Virginia\",\"description\":\"Ntegra IT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ntegrait.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.ntegrait.com\/#\/schema\/person\/33156c118f002b88019c3fc70441bf79\",\"name\":\"Steve West\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ntegrait.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3cc273f166c78aca895198956663df42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3cc273f166c78aca895198956663df42?s=96&d=mm&r=g\",\"caption\":\"Steve West\"},\"description\":\"Ntegra IT is devoted to providing reliable Computer Support to businesses that want to improve productivity and profitability. We deliver custom designed Network Services that better map to your business, so you can stop worrying about your technology and get back to achieving your business goals.\",\"url\":\"https:\/\/ntegrait.com\/author\/swestntegrait-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Intel Chip Vulnerabilities: What We Know So Far! - IT Services in Virginia","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ntegrait.com\/intel-chip-vulnerabilities-what-we-know-so-far\/","og_locale":"en_US","og_type":"article","og_title":"Intel Chip Vulnerabilities: What We Know So Far! - IT Services in Virginia","og_description":"What Do We Know About Terminal Fault (L1TF) Chip Vulnerabilities? Understanding The L1 Terminal Fault (L1TF) Intel has recently confirmed L1 Terminal Fault (L1TF) chip vulnerabilities in its processors that can be manipulated by malware and malevolent virtual machines with the intention of stealing private information from a computer\u2019s memory. Who or What is Vulnerable?…","og_url":"https:\/\/www.ntegrait.com\/intel-chip-vulnerabilities-what-we-know-so-far\/","og_site_name":"IT Services in Virginia","article_published_time":"2018-08-17T19:19:06+00:00","article_modified_time":"2024-02-06T13:50:13+00:00","og_image":[{"width":507,"height":338,"url":"https:\/\/www.ntegrait.com\/wp-content\/uploads\/2018\/08\/ThinkstockPhotos-478884007-1.jpg","type":"image\/jpeg"}],"author":"Steve West","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Steve West","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ntegrait.com\/intel-chip-vulnerabilities-what-we-know-so-far\/","url":"https:\/\/www.ntegrait.com\/intel-chip-vulnerabilities-what-we-know-so-far\/","name":"Intel Chip Vulnerabilities: What We Know So Far! - IT Services in Virginia","isPartOf":{"@id":"https:\/\/www.ntegrait.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ntegrait.com\/intel-chip-vulnerabilities-what-we-know-so-far\/#primaryimage"},"image":{"@id":"https:\/\/www.ntegrait.com\/intel-chip-vulnerabilities-what-we-know-so-far\/#primaryimage"},"thumbnailUrl":"https:\/\/ntegrait.com\/wp-content\/uploads\/2018\/08\/ThinkstockPhotos-478884007-1.jpg","datePublished":"2018-08-17T19:19:06+00:00","dateModified":"2024-02-06T13:50:13+00:00","author":{"@id":"https:\/\/www.ntegrait.com\/#\/schema\/person\/33156c118f002b88019c3fc70441bf79"},"breadcrumb":{"@id":"https:\/\/www.ntegrait.com\/intel-chip-vulnerabilities-what-we-know-so-far\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ntegrait.com\/intel-chip-vulnerabilities-what-we-know-so-far\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ntegrait.com\/intel-chip-vulnerabilities-what-we-know-so-far\/#primaryimage","url":"https:\/\/ntegrait.com\/wp-content\/uploads\/2018\/08\/ThinkstockPhotos-478884007-1.jpg","contentUrl":"https:\/\/ntegrait.com\/wp-content\/uploads\/2018\/08\/ThinkstockPhotos-478884007-1.jpg","width":507,"height":338},{"@type":"BreadcrumbList","@id":"https:\/\/www.ntegrait.com\/intel-chip-vulnerabilities-what-we-know-so-far\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ntegrait.com\/"},{"@type":"ListItem","position":2,"name":"Intel Chip Vulnerabilities: What We Know So Far!"}]},{"@type":"WebSite","@id":"https:\/\/www.ntegrait.com\/#website","url":"https:\/\/www.ntegrait.com\/","name":"IT Services in Virginia","description":"Ntegra IT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ntegrait.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.ntegrait.com\/#\/schema\/person\/33156c118f002b88019c3fc70441bf79","name":"Steve West","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ntegrait.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3cc273f166c78aca895198956663df42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3cc273f166c78aca895198956663df42?s=96&d=mm&r=g","caption":"Steve West"},"description":"Ntegra IT is devoted to providing reliable Computer Support to businesses that want to improve productivity and profitability. We deliver custom designed Network Services that better map to your business, so you can stop worrying about your technology and get back to achieving your business goals.","url":"https:\/\/ntegrait.com\/author\/swestntegrait-com\/"}]}},"_links":{"self":[{"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/posts\/179388","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/comments?post=179388"}],"version-history":[{"count":2,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/posts\/179388\/revisions"}],"predecessor-version":[{"id":181579,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/posts\/179388\/revisions\/181579"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/media\/158861"}],"wp:attachment":[{"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/media?parent=179388"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/categories?post=179388"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/tags?post=179388"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}