Intel cpus har siden været sårbar over for 'zombieload v2' angreb, 'kaskadesø' inkluderet - Intel

Intel-CPU'er, da Haswell er sårbart for 'Zombieload v2' -angreb, inkluderet 'Cascade Lake'

All Intel CPU microarchitectures since 2013 are vulnerable to a new class of 'Zombieload,' attacks, chronicled under 'Zombieload v2' (CVE-2019-11135). This is the fifth kind of microarchitectural data sampling (MDS) vulnerability, besides the four already disclosed and patched against in Q2-2019. The vulnerability was kept secret by the people who discovered it, as Intel was yet to develop a mitigation against it. There is no silicon-level hardening against it, and Intel has released a firmware-level mitigation that will be distributed by motherboard manufacturers as BIOS updates, or perhaps even OS vendors. While Intel's latest enterprise and HEDT microarchitecture, 'Cascade Lake' was thought to be immune to 'Zombieload,' it's being reported that 'Zombieload v2' attacks can still compromise a 'Cascade Lake' based server or HEDT that isn't patched.

'Zombieload v2' er en udnyttelse af Asynchronous Abort-operation af TSX (Transactionional Synchronization Extensions), der opstår, når malware skaber læse-operationskonflikter i CPU'en. Dette lækker angiveligt data om, hvad der ellers behandles. 'Den største fordel ved denne tilgang er, at den også fungerer på maskiner med hardwarefixes til Meltdown, som vi verificerede på en i9-9900K og Xeon Gold 5218,' lyder den seneste version af Zombieload-whitepaper, der er blevet opdateret med 'Zombieload v2' Information. TSX er en forudsætning for 'Zombieload v2' og alle Intel-mikroarkitekturer, da 'Haswell' har den. AMD-processorer er i sagens natur immun mod 'Zombieload v2', da de mangler TSX. Intel bagatelliserede sværhedsgraden eller udbredelsen af ​​'Zombieload v2', men sendte mikrokodeopdateringer markeret 'kritiske' ikke desto mindre.
Source: ZDNet