New side-channel attack vulnerability found in Intel CPU
Security researchers have discovered a new side-channel attack vulnerability in Intel CPUs that could allow attackers to steal sensitive data from a computer system.
The vulnerability, dubbed "CacheOut", is similar to previous side-channel attacks such as Meltdown and Spectre, which were discovered in 2018. CacheOut allows attackers to access data that is supposed to be protected by Intel's SGX (Software Guard Extensions) technology.
SGX is a security feature that allows applications to create secure enclaves, or protected areas of memory, that are isolated from the rest of the system. This is designed to protect sensitive data such as encryption keys and passwords from being accessed by other applications or the operating system itself.
However, CacheOut allows attackers to bypass these protections and access data stored in SGX enclaves. This could potentially allow attackers to steal sensitive data such as passwords, encryption keys, and other confidential information.
Intel has released a security advisory acknowledging the vulnerability and has provided patches to mitigate the risk. However, researchers have noted that the patches may have a significant impact on system performance.
Users are advised to update their systems as soon as possible to protect against this vulnerability. Additionally, it is recommended to use strong passwords and encryption to further protect sensitive data.
As always, it is important to stay vigilant and keep up-to-date with the latest security news and updates to protect against emerging threats.
https://www.lifetechnology.com/blogs/life-technology-technology-news/new-side-channel-attack-vulnerability-found-in-intel-cpu
Buy SuperforceX™