About

Popular Posts

Blog Archive

Search This Blog

Systems Using Intel Processors Vulnerable To SWAPGS Attack

Share it:

Systems Using Intel Processors Vulnerable To SWAPGS Attack



A speculative execution vulnerability has been discovered by BitDefender researchers in systems running Intel modems designed since 2012.
SWAPGS vulnerability permits a malware-ridden program to access the computer’s kernel memory. This, in turn, permits the hacker to browse sensitive information like passwords, chat messages, e-mails, payment info and additional.
At the BlackHat conference 2019, several vendors like Google, Microsoft, Red Hat, ANd Intel free a consultatory concerning the vulnerability.
Back in Gregorian calendar month 2019, Microsoft quietly free a fix for this speculative vulnerability beneath “Patch Tues.” If you have got updated your system with new security updates, then you're already protected against the vulnerability.

⏩ALSO READ: ETHICAL HACKING


What is SWAPGS vulnerability?

The hardware vulnerability that bypasses Spectre and Meltdown protections was ab initio discovered by Andrei Vlad Lutas of Bitdefender, back in 2018. Following this, the researchers reportable the vulnerability to Intel. when operating with Microsoft and Intel, the team set to reveal the vulnerability at the continued BlackHat conference.
Systems with the most recent Intel processors embody a feature referred to as speculative execution. The feature will increase the performance of the mainframe by capital punishment directions before they're required.
However, speculative execution leaves traces within the cache memory, permitting hackers to simply target the directions to keep within the protected kernel memory via side-channel attacks.



The attack exploits the SWAPGS instructions; once tampered with, it will leak plenty of sensitive info from Kernel’s memory.

What do Microsoft, Google, and AMD ought to say?

As i discussed higher than, the Gregorian calendar month Patch from Microsoft has already mounted the vulnerability for all the Intel running systems. “Customers World Health Organization have Windows Update enabled and have applied the safety updates free on Gregorian calendar month nine, 2019, area unit protected mechanically. there's no additional configuration necessary,” writes Microsoft in its post.
Meanwhile, Intel believes that it'd be best if the vulnerability is mounted on the software package level. In its post, the technical school big confirmed that they were operating with Microsoft on the difficulty.
As noted by Bleeping Computer, Google has extra a vulnerability fix in ChromeOS four.19 which can shortly be free for all Chromebooks.
Interestingly, AMD believes they need not been full of the SWAPGS vulnerability. “AMD product area unit designed to not speculate on the new GS worth following a speculative SWAPGS.
On the opposite hand, BitDefender has free a close behavior analysis of the SWAGPS attack that you'll browse here.

Thanks For Reading✌✌✌
Share it:

Tech News