New Intel And AMD CPU Vulnerability Lets Hackers Steal Encryption Keys

Share post:

Researchers have discovered that microprocessors from Intel, AMD, and others have a weakness that attackers can exploit to obtain cryptographic keys and other secret data traveling via hardware.

The team discovered that dynamic voltage and frequency scaling (DVFS)—a power and thermal management feature present in every modern CPU—enables attackers to deduce the changes in power consumption by measuring the time it takes for a server to respond to certain carefully made queries. By understanding how the DVFS feature functions, power side-channel attacks become less complex timing attacks that can be performed remotely.

The researchers have named this attack Hertzbleed as it uses the insights into DVFS to bleed out data that is supposedly private. The vulnerability is tracked as CVE-2022-24436 for Intel chips and CVE-2022-23823 for AMD CPUs. The researchers have demonstrated how the exploit technique they developed can be utilized to extract an encryption key from a server running SIKE, a cryptographic algorithm used to create a secret key between two parties over an insecure communications channel.

The team of researchers said they successfully replicated their attack on Intel CPUs from the 8th to the 11th generation of the Core microarchitecture. They also claimed that this attack would work on Intel Xeon CPUs and confirmed that AMD Ryzen processors are vulnerable and also allowed the same SIKE attack used against Intel chips. The researchers also claimed that chips made by other manufacturers may also be vulnerable.

It remains unclear if Hertzbleed represents a clear threat. Hence, developers should keenly study how the findings impact the security of the cryptographic software they design. 

For more information, read the original story in Arstechnica.

SUBSCRIBE NOW

Related articles

North Korean hacker infiltrates US security vendor, loads malware

KnowBe4, a US-based security vendor, unknowingly hired a North Korean hacker who attempted to introduce malware into the...

CrowdStrike releases an update from initial Post Incident Review: Hashtag Trending Special Edition for Thursday July 25, 2024

Security vendor CrowdStrike released an update on from their initial Post Incident Review today. The first, and most surprising...

Security vendor CrowdStrike issues an update from their initial Post Incident Review

Security vendor CrowdStrike released an update from their initial Post Incident Review (PIR) today. The company's CEO has...

CrowdStrike CEO summoned by Homeland Security committee over software disaster

CrowdStrike CEO George Kurtz has been called to testify before the U.S. House Committee on Homeland Security following...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways