New Intel And AMD CPU Vulnerability Lets Hackers Steal Encryption Keys

Share post:

Researchers have discovered that microprocessors from Intel, AMD, and others have a weakness that attackers can exploit to obtain cryptographic keys and other secret data traveling via hardware.

The team discovered that dynamic voltage and frequency scaling (DVFS)—a power and thermal management feature present in every modern CPU—enables attackers to deduce the changes in power consumption by measuring the time it takes for a server to respond to certain carefully made queries. By understanding how the DVFS feature functions, power side-channel attacks become less complex timing attacks that can be performed remotely.

The researchers have named this attack Hertzbleed as it uses the insights into DVFS to bleed out data that is supposedly private. The vulnerability is tracked as CVE-2022-24436 for Intel chips and CVE-2022-23823 for AMD CPUs. The researchers have demonstrated how the exploit technique they developed can be utilized to extract an encryption key from a server running SIKE, a cryptographic algorithm used to create a secret key between two parties over an insecure communications channel.

The team of researchers said they successfully replicated their attack on Intel CPUs from the 8th to the 11th generation of the Core microarchitecture. They also claimed that this attack would work on Intel Xeon CPUs and confirmed that AMD Ryzen processors are vulnerable and also allowed the same SIKE attack used against Intel chips. The researchers also claimed that chips made by other manufacturers may also be vulnerable.

It remains unclear if Hertzbleed represents a clear threat. Hence, developers should keenly study how the findings impact the security of the cryptographic software they design. 

For more information, read the original story in Arstechnica.

SUBSCRIBE NOW

Related articles

MIT students exploit blockchain vulnerability to steal 25 million dollars

Two MIT students have been implicated in a highly sophisticated cryptocurrency heist, where they reportedly exploited a vulnerability...

iOS update brings back photos users thought were permanently deleted

After a recent iOS update, a number of iPhone users have found themselves facing unexpected blasts from the...

Cyber Security Today, May 15, 2024 – Ebury botnet still exploits Linux servers, Microsoft, SAP and Apple issue security updates

The Ebury botnet continues to exploit Linux servers, Microsoft, SAP and Apple issue security updates, and more. Welcome to...

Employee errors still predominant cause of data breaches: Verizon Report

In the latest 2024 Verizon Data Breach Report (DBIR), it has been revealed that employee errors remain the...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways