Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security //

Data Leakage

7/30/2018
09:50 AM
Larry Loeb
Larry Loeb
Larry Loeb
50%
50%

New Spectre-Like Vulnerability Allows for Remote Data Theft

Researchers have found new Spectre-like vulnerability in x86 processors called NetSpectre, which allows attackers to steal data remotely.

A group of four researchers from Graz University of Technology have published a paper that describes a network-based CPU attack that mimics Spectre v1 (CVE-2017-5753). It does not require that any hosting code be present on a victim machine.

The researchers published the paper, "NetSpectre: Read Arbitrary Memory over Network," earlier this month but they did give Intel time to respond to their results.

Currently, only 15 bits an hour can be exfiltrated from a CPU cache. But the authors also managed to get four times that amount out -- 60 bits/hour -- by focusing on the AVX2 module which only Intel CPUs use.

CPUs that are vulnerable to Spectre v1 are thought to be affected by the NetSpectre attack as well. The researchers found ARM processors are also vulnerable to this technique, so the issue goes beyond Intel's chips.

The researchers also found the Google cloud to be vulnerable to the attack.

NetSpectre is an access-driven remote Evict+Reload cache attack. It does not use a cache covert channel as Spectre does.

The university team used a technique that they call value-thresholding, which leaks a secret value without the typical bit selection mechanisms. With it, an attacker only needs to send a series of crafted requests to the victim and measures the response time in order to leak a secret value from the victim's memory.

The researchers found that it is possible for an attacker to distinguish cache hits and misses on specific cache lines remotely, by measuring and averaging over a large number of measurements.

Additionally, the researchers found that weaker forms of local Spectre attacks, which are considered to be incapable of leaking actual data, end up as very powerful in remote Spectre attacks. These can enable remote address space layout randomization (ASLR) breaks without any code execution on the device.

ASLR is a widely used defense mechanism that randomizes virtually all addresses in the memory space.

An attacker with local code execution can bypass ASLR since ASLR mostly aims at defending against remote attacks but not local attacks. When the local code that is already present in a CPU is combined with the NetSpectre attack, implementing ASLR breakage is enhanced. This makes implementing the NetSpectre attack easier.

It was found that breaking ASLR could take up to two hours of flooding the device with requests.

The researchers suggested some initial mitigation strategies.

One uses distributed denial of service (DDoS) protection on the network, as thousands of multiple identical packets would be sent from the same source in the attack.


Zero in on the most attractive 5G NR deployment strategies, and take a look ahead to later technology developments and service innovations. Join us for the Deployment Strategies for 5G NR breakfast workshop in LA at MWCA on September 12. Register now to learn from and network with industry experts – communications service providers get in free!

However, the attacker can vary the speed at which bits are leaked by reducing the packets sent to a level below the threshold that the DDoS monitoring (or IDS monitoring) can detect.

Another way is to add artificial noise to the network latency. This would make an attacker perform more measurements to get leakage.

As the researchers note: "Both approaches may mitigate NetSpectre attacks in practice. However, as attackers can adapt and improve attacks, it is not safe to assume that noise levels and monitoring thresholds chosen now will still be valid in the near future."

As of the moment, however, this is a low-yield and not very productive attack. Still, like Rowhammer, improvements to how it is done will happen over time as attackers' interest is piqued. (See Throwhammer & Nethhammer Show How Chips Are Vulnerable to Bit Flips.)

Security experts are warning businesses to be aware that more of these attacks are being discovered.

"Although, in practice, the threat of this new evolution of the Spectre vulnerability being exploited is low, it is something to continue watching. Researchers continue to find flaws that could potentially lead to remote code execution in the future and security companies and practitioners need to continue to keep up-to-date with the latest research and mitigation techniques," Dan Hubbard, chief security architect at Lacework, which provides cloud security tools, wrote in an email to Security Now.

Related posts:

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/14/2020
Lock-Pickers Face an Uncertain Future Online
Seth Rosenblatt, Contributing Writer,  8/10/2020
Hacking It as a CISO: Advice for Security Leadership
Kelly Sheridan, Staff Editor, Dark Reading,  8/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 New Cybersecurity Vulnerabilities That Could Put Your Enterprise at Risk
In this Dark Reading Tech Digest, we look at the ways security researchers and ethical hackers find critical vulnerabilities and offer insights into how you can fix them before attackers can exploit them.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-17475
PUBLISHED: 2020-08-14
Lack of authentication in the network relays used in MEGVII Koala 2.9.1-c3s allows attackers to grant physical access to anyone by sending packet data to UDP port 5000.
CVE-2020-0255
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-10751. Reason: This candidate is a duplicate of CVE-2020-10751. Notes: All CVE users should reference CVE-2020-10751 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidenta...
CVE-2020-14353
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-18270. Reason: This candidate is a duplicate of CVE-2017-18270. Notes: All CVE users should reference CVE-2017-18270 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidenta...
CVE-2020-17464
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
CVE-2020-17473
PUBLISHED: 2020-08-14
Lack of mutual authentication in ZKTeco FaceDepot 7B 1.0.213 and ZKBiosecurity Server 1.0.0_20190723 allows an attacker to obtain a long-lasting token by impersonating the server.