DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Talk To An Expert
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Talk To An Expert
CyberMaterial
Home Alerts

Inception Attack Targets AMD Zen Processors

August 9, 2023
Reading Time: 2 mins read
in Alerts

Researchers have uncovered a powerful new transient execution attack dubbed ‘Inception,’ capable of leaking privileged data from all AMD Zen CPUs, including the latest models.

Leveraging speculative execution, a feature in modern processors that enhances CPU performance, this attack exploits unprivileged processes to access sensitive information. By ingeniously combining the ‘Phantom speculation’ technique with the ‘Training in Transient Execution’ approach, the Inception attack manipulates CPU behavior, creating an overflow in the return stack buffer and allowing arbitrary data leakage from unprivileged processes on any AMD Zen CPU. Despite the presence of mitigations against known speculative execution attacks like Spectre, Inception’s data leak rate is 39 bytes/sec, potentially compromising passwords and encryption keys within seconds.

ETH Zurich’s researchers have found that this vulnerability impacts all AMD Zen-based Ryzen and EPYC CPUs, from Zen 1 to Zen 4, making them susceptible to Phantom and Inception attacks.

While Intel CPUs could be impacted by specific TTE (Training in Transient Execution) variants, the eIBRS mitigations on Intel CPUs offer some protection against the Phantom technique. This hardware-level flaw can potentially affect any operating system using vulnerable AMD CPUs, underscoring the severity of the issue.

To address this vulnerability, a potential mitigation strategy involves fully flushing the branch predictor state during context switching, albeit at the cost of significant performance overhead on older Zen 1(+) and Zen 2 CPUs. AMD has responded to the threat by releasing microcode updates for Zen 3 and Zen 4 CPUs, enabling a hardware-based mitigation feature. Owners of Zen-based AMD processors are advised to promptly install the latest microcode updates, which may be delivered through computer vendors or operating system security patches.

While the ETH Zurich team has created a proof-of-concept that runs on Linux, the hardware nature of the flaw implies that these attacks could work on various operating systems that use vulnerable AMD Zen CPUs.

The potential impact of Inception reinforces the ongoing challenge of maintaining hardware security in the face of evolving attack techniques, prompting AMD and other industry players to take swift action to safeguard users against such vulnerabilities.

Source:
  • Inception: how a simple XOR can cause a Microarchitectural Stack Overflow
  • All AMD Ryzen CPUs susceptible to new “Inception” attack that leaks sensitive data
Tags: AlertsAlerts 2023AMDAugust 2023CyberattackCybersecurityInceptionSensitive dataVulnerabilities
23
VIEWS
ADVERTISEMENT

Related Posts

Critical WordPress Plugin Flaws

Critical WordPress Plugin Flaws

September 29, 2023
Cisco Warns of Critical SD-WAN Flaw

Cisco Warns of Critical SD-WAN Flaw

September 29, 2023
Malicious Packages on npm and PyPI

Malicious Packages on npm and PyPI

September 29, 2023
Critical WordPress Plugin Flaws

Critical SharePoint Vulnerabilities Revealed

September 29, 2023

More Articles

Incidents

IT Services Provider Hit by Donut Gang

September 22, 2023
Alerts

Chinese-Language Phishing Campaigns

September 20, 2023
Cyber Briefing

September 22, 2023 – Cyber Briefing

September 22, 2023
Cyber Briefing

September 21, 2023 – Cyber Briefing

September 21, 2023

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Alerts
  • Incidents
  • News
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
    • Tutorials
  • Report Cyber Incident
  • GET HELP
  • Contact Us

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.