AMD and Intel chips are at risk from another major vulnerability

Fixing could mean hindering performance, experts warn

When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.

Microprocessors from bothIntelandAMDare carrying a security vulnerability not unlike theSpectre/Meltdownflaws that rocked the entire computer industry a few years ago, researchers are saying.

Two researchers from ETH Zurich, one doctoral student Johannes Wikner, and one professor for computer security, Kaveh Razavi, said that the discovered flaw allows abusers access to kernel memory, and given the nature of the flaw, fixing it also means slowing the chips down.

The flaw is dubbed Retbleed, and revolves around the chips’ speculative calculations. “When computers execute special calculation steps to compute faster, they leave traces that hackers could abuse,” the researchers said.

Exploiting the flaw

Exploiting the flaw

These traces can be exploited, the researchers further found, giving threat actors unauthorized access to any information in the targetendpoint, which includes encryption keys, passwords, and other secrets.

The flaw is particularly risky in cloud environments, the researchers further said, where multiple companies share the same systems. In other words, one vulnerability could expose the secrets of multiple companies.

The National Center for Cyber Security in Bern, Switzerland considers the vulnerability serious because the affected processors are in use worldwide, the researchers sad.

“We have shown that with speculative execution, a particularly large number of return statements are vulnerable and can be hijacked,” says Wikner. In principle, “Retbleed” works like variant 2 of “Spectre” and affects Intel and AMD microprocessors.

Are you a pro? Subscribe to our newsletter

Are you a pro? Subscribe to our newsletter

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

“Since the mitigation measures taken so far did not take the return instructions into account, most existing microprocessor computer systems are vulnerable to ‘Retbleed’,” Razavi adds. “However, it takes some computer expertise to gain memory access and steal information,” Wikner says.

Spectre returns - Intel and ARM-based CPUs hit by serious vulnerability>Keeping your CPU safe from Spectre imposes serious performance penalty>These are the best ransomware protections right now

The silver lining is that while older chips may be more vulnerable, newer architecture makes pulling these attacks off somewhat difficult. Still, fixing the issue means impacting the performance of the devices.

“Retbleed’s patch overhead is going to between 13 percent and 39 percent,” the two researchers said. “Mitigating Phantom JMPs has 106 percent overhead (ie, 2 times slower).”

Retbleed is being tracked as CVE-2022-29900 for AMD, and CVE-2022-29901 and CVE-2022-28693 for Intel. CVE-2022-23816 and CVE-2022-23825 have also been designated to Retbleed on AMD.

In a statement shared with TechRadar Pro, Intel said: “Intel worked with our industry mitigation partners, the Linux community and VMM vendors to make mitigations available to customers. Windows systems are not affected as they already have these mitigations by default.”

Intel also released a summary of the vulnerabilitieshereand a technical advisoryhere.

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

This new phishing strategy utilizes GitHub comments to distribute malware

Should your VPN always be on?

Phishing attacks surge in 2024 as cybercriminals adopt AI tools and multi-channel tactics