Security Market Segment LS
Wednesday, 15 August 2018 08:43

New speculative execution flaws found in Intel chips Featured

New speculative execution flaws found in Intel chips Courtesy: Intel

Intel has released details of three more vulnerabilities in its Core and Xeon processor lines, all of which involve exploiting the feature known as speculative execution where processors attempt to anticipate and execute instructions.

The vulnerability, known as Foreshadow, has two versions: the original designed to extract data from software guard extension (SGX) enclaves and a next-generation version which affects virtual machines, hypervisors, operating system kernel memory, and system management mode memory, according to a site devoted to the vulnerability.

The flaws have been given the advisories CVE-2018-3615 (for SGX), CVE-2018-3620 (for operating systems and SMM) and CVE-2018-3646 (for virtualisation).

In January, Intel announced two flaws named Meltdown and Spectre which used speculative execution to attack systems.

Foreshadow was discovered independently by two teams: Jo Van Bulck, Frank Piessens, Raoul Strackx (imec-DistriNet, KU Leuven) and Marina Minkin, Mark Silberstein (Technion), Ofir Weisse, Daniel Genkin, Baris Kasikci, Thomas F. Wenisch (University of Michigan) and Yuval Yarom (University of Adelaide and CSIRO's Data61).

The other two flaws were found by Intel. The first team notified Intel on 3 January, and the second on 23 January.

SGX is a feature developed by Intel and present in Intel Core processors and Intel Xeon processors. It enables computers to protect users' data even if the system gets taken over by an attacker.

At the time when the Meltdown and Spectre attacks were disclosed, it was thought that SGX was immune to speculative execution attacks.

"Foreshadow demonstrates how speculative execution can be exploited for reading the contents of SGX-protected memory as well as extracting the machine’s private attestation key," the advisory said.

"Making things worse, due to SGX’s privacy features, an attestation report cannot be linked to the identity of its signer. Thus, it only takes a single compromised SGX machine to erode trust in the entire SGX ecosystem."

Dr Yarom, of the CSIRO's Data 61 unit and the University of Adelaide's school of Computer Science, who was part of the second team, said: "SGX can be used by developers to enable secure browsing to protect fingerprints used in biometric authentication, or to prevent content being downloaded from video streaming services.

“Foreshadow compromises the confidentiality of the ‘fortresses’, where this sensitive information is stored and once a single fortress is breached, the whole system becomes vulnerable.

“The SGX feature is widely used by developers and businesses globally, and this opens them up to a data breach that can potentially affect their customers as well. Intel will need to revoke the encryption keys used for authentication in millions of computers worldwide to mitigate the impact of Foreshadow.

"Intel’s discovery of the Foreshadow-NG variant is even more severe, but will require further research to gauge the full impact of the vulnerability.”

Google and Microsoft have issued their own advisories about the vulnerabilities. Intel's advisory is here.

Videos: courtesy Intel and Foreshadow vulnerability researchers


You cannot afford to miss this Dell Webinar.

With Windows 7 support ending 14th January 2020, its time to start looking at your options.

This can have significant impacts on your organisation but also presents organisations with an opportunity to fundamentally rethink the way users work.

The Details

When: Thursday, September 26, 2019
Presenter: Dell Technologies
Location: Your Computer


QLD, VIC, NSW, ACT & TAS: 11:00 am
SA, NT: 10:30 am
WA: 9:00 am NZ: 1:00 pm

Register and find out all the details you need to know below.



iTWire can help you promote your company, services, and products.


Advertise on the iTWire News Site / Website

Advertise in the iTWire UPDATE / Newsletter

Promote your message via iTWire Sponsored Content/News

Guest Opinion for Home Page exposure

Contact Andrew on 0412 390 000 or email [email protected]


Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.



Recent Comments