Two different groups of researchers found another speculative execution attack that can steal all the data a CPU touches. You can help protect yourself from scammers by verifying that the contact is a Intel had asked all the researchers—who split into two groups working independently—to keep their findings secret, some for more than a year, until it could release fixes for the vulnerabilities. If the CPU guesses incorrectly, it immediately discards it. [#video: https://www.youtube.com/embed/wQvgyChrk_g. "It's in their interest to say, 'No, after Spectre and Meltdown, we didn't overlook other vulnerabilities; it's just that these were so minor that they slipped by.'" The Apple Spectre + Meltdown Patches Detailed; These Windows 10 Updates Are Bricking AMD PCs! A side-effect of the patch may be to slow down some systems, although Microsoft claims "for most consumer devices, the impact may not be noticeable". To make that filtering easier, they showed that an attacker could trick the CPU into leaking the same secret repeatedly, helping to distinguish it from the surrounding noise. In a call with WIRED, Intel says its own researchers were the first to discover the MDS vulnerabilities last year, and that it has now released fixes for the flaw in both hardware and software. Source: Epicgames.com. At the time this article was published, PCs running anti-virus from the following vendors were not able to receive the patch automatically: BitDefender, Carbon Black, Cisco, CrowdStrike, Cylance, Cyren, Endgame, Fortinet, G-DATA, McAfee, Nyotron, Palo-Alto, SentinelOne, Sophos, Trend Micro, VIPRE and Webroot. ", All of that casts doubt on Intel's severity rating for the MDS attacks, the researchers argue. Most unpatched PCs and servers are susceptible to hackers exploiting the Meltdown and Spectre vulnerabilities to extract sensitive information such as passwords, although Microsoft says it is unaware of the flaws being used in attacks to date. The breakthroughs and innovations that we uncover lead to new ways of thinking, new connections, and new industries. Meltdown Redux: Intel Flaw Lets Hackers Siphon Secrets from Millions of PCs. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre and Meltdown) involving speculative execution side channels that affect AMD, ARM, and Intel processors to varying degrees. Intel changed its offer to the full $100,000. More than a year has passed since security researchers revealed Meltdown and Spectre, a pair of flaws in the deep-seated, arcane features of millions of chip sold by Intel and AMD, putting practically every computer in the world at risk. "In essence, [MDS] puts a glass to the wall that separates security domains, allowing attackers to listen to the babbling of CPU components," reads one line of a VUSec paper on the flaws, which will be presented next week at the IEEE Symposium on Security and Privacy. How do Users ensure that ant Windows Updates they remove - to 'eject' the (bad) Intel Patch for Meltdown & Spectre - are not 'automatically' re-installed' later - by Automatic Windows Updates, when Windows notices the 'removed updates' are not installed? The Meltdown and Spectre flaw affects all devices with Intel processors. "We hear anything that these components exchange.". The TU Graz researchers, three of whom worked on the Spectre and Meltdown attacks, rate the MDS attacks roughly between those two earlier vulnerabilities, less serious than Meltdown but worse than Spectre. Provide a List of Windows Updates that included the (bad) Intel Patches for Meltdown & Spectre (which Intel now say should NOT be installed). A: Intel has provided system and motherboard manufacturers with the necessary firmware and software updates to resolve the vulnerabilities identified in Security Advisory Intel-SA-00086. The list of compatible AV products is available here and is continuing to be updated by cybersecurity researcher Kevin Beaumont. But repeat it millions of times in succession and an attacker can start leaking streams of all the data the CPU is accessing in real time. This thread is locked. (They point out that Intel rated Spectre and Meltdown at medium severity, too, a judgement with which they disagreed at the time.). Here’s why. Provide a List of Windows Updates that included the (bad) Intel Patches for Meltdown & Spectre (which Intel now say should NOT be installed). If you'd like to express a view on what I've asked Andre De Costa (further down this Thread) you're opinion on these points would be very welcome. TU Graz's video below shows a simple demonstration in which an untrusted program on the computer can determine what websites someone visits. Pre-2016 Intel CPUs Hit Worst By Meltdown + Spectre Fix; Yes, AMD CPUs Are Also Vulnerable To Spectre 2 Exploit; AMD K10 And K8 Processors Also Vulnerable To Spectre; KB3078130 : Emergency Windows Update To Disable Intel Spectre Patches! Note: I've looked at the Microsoft.com Descriptions of Numerous Recent Windows Updates and (although some refer to 'security') none seem to specifically mention Intel, Meltdown or Spectre - so I can't determine which Windows Updates included the 'bad' Intel In these new cases, researchers found that they could use speculative execution to trick Intel's processors into grabbing sensitive data that's moving from one component of a chip to another. Contact your system or motherboard manufacturer regarding their plans for making the updates available to end users. It affects all out-of-order Intel processors released since 1995 with the exception of Itanium and pre-2013 Atoms. A more permanent hardware patch, which has already been included in some chips Intel released starting last month, addresses the problem more directly, preventing the processor from grabbing data out of buffers during speculative execution. The WIRED conversation illuminates how technology is changing every aspect of our lives—from culture to business, science to design. It’s basic statistics. Advise IF (and HOW) the Windows Updates that included (bad) Intel Patches for Meltdown & Spectre should be 'removed' by End Users? However, the vast majority of firms have stated they are working on a fix, with BitDefender, CrowdStrike, McAfee and Trend Micro among those suggesting the patch will be able to be applied imminently. In the meantime, however, the researchers and Intel disagree on the severity of the problem and how to triage it. A list of which anti-virus products are incompatible with the patch against the CPU flaws is now available. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of Condé Nast. Upgrade your work game with our Gear team's. But security researchers found that they could reliably dig through that raw output to find the valuable information they sought. You can follow the question or vote as helpful, but you cannot reply to this thread. 2. While it might seem strange that so many researchers found the MDS flaws within the same window of time—as least two independent teams of seven organizations, plus Intel itself—the TU Graz researchers say that it's to be expected: The discovery of Spectre and Meltdown unlocked a new, deeply complex and unexplored attack surface for hackers, one that could yield serious, fundamental security flaws in hardware well into the future. Here's what I've just asked Andre further down this Thread: 1. Ad Choices, Meltdown Redux: Intel Flaw Lets Hackers Siphon Secrets from Millions of PCs. You can test if your system is affected with a tool the researchers published here. On January 2nd, The Register exposed Intel's then-secret Meltdown and Spectre vulnerabilities through investigative journalism. VUSec refused the offer of more total money in favor of a bounty that better reflected the severity of its findings, and it threatened to opt out of a bug bounty in protest. Intel itself has more tamely labeled the new set of attacks Microarchitectural Data Sampling, or MDS. Meltdown (rogue data cache load — CVE-2017-5754) Meltdown is a CPU vulnerability that allows a user mode program to access privileged kernel-mode memory. But even as chipmakers scrambled to fix those flaws, researchers warned that they weren't the end of the story, but the beginning—that they represented a new class of security vulnerability that would no doubt surface again and again. A number of AV firms also say the believe their anti-virus is compatible with the patch but they have not yet updated the Windows registry on customer machines to allow the patch to be installed. "There are still more components, and many of them are not documented at all, so it's not unlikely this continues for a while," says TU Graz's Moritz Lipp. By the way, what is Microsoft Advising / Recommending about either keeping or removing the Windows Updates with the (bad) Intel Patches for Meltdown & Spectre? On April 2nd, 2018, they announced that processors that have not yet been patched will never be patched. That's hardly the kind of money paid out for trivial issues, he points out. AMD and ARM chips don't appear to be vulnerable to the attacks, and Intel says that some models of chip it's released in the past month include a fix for the problem. Hacker and security researcher Samy Kamkar takes a look at a variety of hacking scenes from popular media and examines their authenticity. More information has emerged on which anti-virus products are incompatible with a Windows patch against the Meltdown and Spectre CPU flaws. 1. If you’re clever, and you process the stuff carefully, you don’t drown.". system's ability to prevent the Meltdown and Spectre attacks. In a publicly released picture, we can see the issues their servers had after the first patch. Nick Heath is a computer science student and was formerly a journalist at TechRepublic and ZDNet. Think of that guess like a lazy waiter offering a random drink from his tray, in hopes of sparing himself a trip back to the bar. Intel's fixes for the meltdown patch. Intel has finished designing microcode update patches for its processors. Unlike Meltdown, which used speculative execution to grab sensitive data sitting in memory, MDS attacks focus on the buffers that sit between a chip's components, such as between a processor and its cache, the small portion of memory allotted to the processor to keep frequently accessed data close at hand. Tech support scams are an industry-wide issue where scammers trick you into paying for unnecessary His fellow researcher Daniel Gruss adds: "We always expected this would keep us busy for years." "It’s easy to do and potentially devastating," says VUSec researcher Herbort Bos. 2. VUSec, for instance, created a proof of concept, shown above, that can pull hashed passwords—strings of encrypted passwords that can often be cracked by hackers—out of a target chip's component called a line-fill buffer. Antivirus firms that have confirmed compatibility and set the registry keys so the patch can be applied include Avast, Avira, EMSI, ESET, F-Secure, Kaspersky, and Malwarebytes. Can I get those good 'fixes' without also getting the (bad) Intel Patches? VMware did not immediately respond to an inquiry about the status of their patching. You can help protect yourself from scammers by verifying that the contact is a, official the (bad) Patches for Meltdown & Spectre? official technical support services. WIRED is where tomorrow is realized. Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. It's four distinct attacks, in fact, though all of them use a similar technique, and all are capable of siphoning a stream of potentially sensitive data from a computer's CPU to an attacker. Intel releases more Meltdown/Spectre firmware fixes, Microsoft feints an SP3 patch Intel says it has most -- but not all -- of the buggy Meltdown/Spectre firmware patches in order. The four different MDS attack variants all take advantage of a quirk in how Intel's chips perform their time-saving trick. "We always expected this would keep us busy for years.". 3. If Microsoft Identifies (to it's Community) Windows Updates that included (bad) Intel Patches, can Users remove them - while still getting any other 'fixes' (that did NOT relate to Meltdown & Spectre) included in the Same Windows Updates that contained The issue is, you can't tell by looking at the descriptions of any Windows Update whether it contains the (bad) Meltdown & Spectre Intel Patch, because the Windows Updates don't specifically mention those names. A software patch for the attack clears all data from buffers whenever the processor crosses a security boundary, so that it can't be stolen and leaked. "It's kind of like we treat the CPU as a network of components, and we basically eavesdrop on the traffic between them," says Cristiano Giuffrida, one of the researchers in the VUSec group at Vrije Universiteit Amsterdam who discovered the MDS attack. "We drink from the firehose. But he also says that Intel at one point offered VUSec only a $40,000 bug bounty, accompanied by a $80,000 "gift"—which Giuffrida saw as an attempt to reduce the bounty amount cited publicly and thus the perceived severity of the MDS flaws. "Some of the data will always be the same, and other data will change. Microsoft patched Windows against the vulnerabilities on Wednesday, but said certain systems would not receive the patch on release, due to a clash with some anti-virus software. Intel insisted in a phone call with WIRED that the flaws don't warrant disabling that feature, which would have a serious performance cost for users. Microsoft Agent or Learn More. We see what occurs most often, and this is the data we’re interested in. There are two things you need to do to protect your computer: Tech support scams are an industry-wide issue where scammers trick you into paying for unnecessary 2. Computers with AMD processors are affected by Spectre, although it is significantly more difficult to exploit than Meltdown. Is it generally though it's best to remove those Windows Updates or leave them in place? Like Meltdown and Spectre, the new MDS attack takes advantage of security flaws in how Intel chips perform speculative execution, a feature in which a processor guesses ahead of time at what operations and data it will be asked to execute, in order to speed up the chip's performance. ALL RIGHTS RESERVED. Just as with Meltdown and Spectre, the attacker's code can leak the data that the processor has taken from the buffer via the processor's cache. The unwanted Windows Updates we're talking about - presumably also included some good 'fixes' that were nothing to do with Meltdown and Spectre. 1. Protect Yourself From Tech Support Scams To manually update the registry, add the following key: Key="HKEY_LOCAL_MACHINE" Subkey="SOFTWARE\Microsoft\Windows\CurrentVersion\QualityCompat" Value="cadca5fe-87d3-4b96-b7fb-a231484277cc" Type="REG_DWORD". But the article mentions with patch applies it. ", Or, as VUSec's Bos puts it, "We drink from the firehose. "For other affected products, mitigation is available through microcode updates, coupled with corresponding updates to operating system and hypervisor software that are available starting today," a statement from an Intel spokesperson reads. What this Dataview enables our partners to do is quickly see the health of managed devices having the appropriate patches installed. Google says it's also implemented updates for its affected products, as has Amazon. It is the essential source of information and ideas that make sense of a world in constant transformation. 4. Microsoft has also said it will update the UEFI, software that runs before the operating system boots, on Surface devices to help mitigate the risk posed by Spectre. Use of this site constitutes acceptance of our User Agreement (updated 1/1/20) and Privacy Policy and Cookie Statement (updated 1/1/20) and Your California Privacy Rights. Patches. Thanks for your feedback, it helps us improve the site. 3. Admins can manually update the Windows registry to install the patch, however Microsoft cautions that doing so may cause serious problems that "require you to reinstall your operating system". SEE: Incident response policy (Tech Pro Research). 1. © 2020 Condé Nast. The Meltdown and Spectre flaw affects all devices with Intel processors. Now, some of those same researchers have uncovered yet another flaw in the deepest guts of Intel's microscopic hardware. What is Microsoft Advising / Recommending about either keeping or removing the Windows Updates with the (bad) Intel Patches for Meltdown & Spectre? "It throws these results away," says VUSec's Guiffrida. VUSec's Giuffrida notes that his team was paid $100,000 by Intel for their work as part of the company's "bug bounty" program that rewards researchers who warn the company about critical flaws. 3. Both TU Graz and VUSec recommend that software makers disable hyperthreading, a feature of Intel chips that accelerates their processing by allowing more tasks to be performed in parallel, but could make certain variants of the MDS attacks vastly easier to pull off. A list of vulnerable ARM processors and mitigations is listed here. said certain systems would not receive the patch on release, Top 5 programming languages for security admins to learn, Top 10 antivirus software options for security-conscious users, End user data backup policy (TechRepublic Premium), Emergency Windows Meltdown patch may be incompatible with your PC, Massive Intel CPU flaw: Understanding the technical details of Meltdown and Spectre, Critical flaws revealed to affect most Intel chips since 1995, Intel chips have critical design flaw, and fixing it will slow Linux, Mac, and Windows systems, Nope, no Intel chip recall after Spectre and Meltdown, CEO says, The future of Everything as a Service (free PDF), Linux security: Google fuzzer finds ton of holes in kernel's USB subsystem, How to upgrade the Linux kernel with a handy GUI, Intel: We've found severe bugs in secretive Management Engine, affecting millions. The researchers hail from the Austrian university TU Graz, Vrije Universiteit Amsterdam, the University of Michigan, the University of Adelaide, KU Leuven in Belgium, Worcester Polytechnic Institute, Saarland University in Germany, and security firms Cyberus, BitDefender, Qihoo360, and Oracle. Updated 5/14/19 5:30 EST with more information about security updates from affected companies. TechRepublic Premium: The best IT policies, templates, and tools, for today and tomorrow. Microsoft global customer service number, ___________________________________________________________________. Here's how different cores act after an update. But at the same time, the company has sought to downplay the severity of the bugs, according to the researchers, who warn that the attacks represent a serious flaw in Intel's hardware that may require disabling some of its features, even beyond the company's patch. Intel, Apple, Google and Microsoft among other tech giants have released patches to address the flaws. In speculative execution, a CPU frequently follows a branch of commands in code before a program asks it to, or guesses at the data the program is requesting, in order to get a head start. It appears that one of them (#1) has increased its usage because it is stopping the discovered leak. Computers with AMD processors are affected by Spectre, although it is significantly more difficult to exploit than Meltdown. "We’re aware of this industry-wide issue and have been working closely with affected chip manufacturers to develop and test mitigations to protect our customers," the company's statement reads.