Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Security Management //

Patch Management

5/4/2018
09:35 AM
Scott Ferguson
Scott Ferguson
News Analysis-Security Now
50%
50%

'Spectre NG' Flaws Reportedly Found in Intel Chips

A German magazine is reporting that 'Spectre Next Generation' vulnerabilities have been found in Intel's x86 processors, although full details are not being released yet.

Get ready for a new generation of Spectre vulnerabilities to appear in x86 chips.

On May 3, German magazine c't published a report that claims researchers have found eight new security flaws in Intel processors that are being tentatively called "Spectre Next Generation" or "Spectre NG."

Several teams of security researchers have reported the new Spectre-like vulnerabilities to Intel, although the technical details of these flaws are being withheld right now, according to the report. The story also claims that Intel is working on patches to address these new sets of hardware issues.

Once again, it appears that Google Project Zero, the search company's security division, has been aware of at least one of these flaws. The Google team alerted Intel to the Spectre and Meltdown side-channel vulnerabilities in 2017, before additional details were released by university researchers in January. (See Meltdown & Spectre News Gets Worse – & Better.)

(Source: iStock)
(Source: iStock)

In addition to Intel, c't reports that these flaws could also affect AMD and ARM processors as well.

While the technical details are being withheld to give the companies involved time to respond and issue patches and fixes, the magazine reported that the Spectre NG flaws work in the same manner as the original Spectre and Meltdown vulnerabilities.

The new set of flaws were discovered through the Common Vulnerability Enumerator (CVE), which is an industry repository of known cybersecurity vulnerabilities that contains identification numbers, descriptions and public references. Intel appears to have labeled at least four of the next-generation flaws as "high-risk." The other four are deemed moderate.

It is also likely, according to the report, that each of the eight vulnerabilities will require their own patch.

For its part, Intel is remaining quiet about the report, although a note published on the company's website on Thursday seems to hint that the chip maker is aware of new vulnerabilities and is working to fix the issues.

"We routinely work closely with customers, partners, other chipmakers and researchers to understand and mitigate any issues that are identified, and part of this process involves reserving blocks of CVE numbers," according to Intel's post. "We believe strongly in the value of coordinated disclosure and will share additional details on any potential issues as we finalize mitigations. As a best practice, we continue to encourage everyone to keep their systems up-to-date."


The fundamentals of network security are being redefined -- don't get left in the dark by a DDoS attack! Join us in Austin from May 14-16 at the fifth-annual Big Communications Event. There's still time to register and communications service providers get in free!

When the original Spectre and Meltdown flaws were disclosed at the beginning of this year, researchers reported that by manipulating pre-executed commands within x86 chips, which help make data available faster, hackers can gain access to the content of the kernel memory. The security issue is that this flaw can allow a hacker to gain access to encryption keys and other authentication details of whatever system the CPU is running in.

Since that time, Intel has been issuing patches and promising to do a better job of alerting the community to security flaws, although the company recently admitted that some chips will never get Spectre and Meltdown fixes. (See Intel Will Leave Some Chips Without Spectre Patch.)

What makes the original Spectre and Meltdown particularly tricky to fix is the fact there are variations to each flaw. Specifically, Spectre has two different issues called Variant 1 and Variant 2. In the case of Variant 2, the flaw is the harder one to exploit by attackers but also the more difficult to fix. (See 5 New Network Attack Techniques That Will Keep You Awake at Night.)

Related posts:

— Scott Ferguson is the managing editor of Light Reading and the editor of Security Now. Follow him on Twitter @sferguson_LR.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises are Attacking the Cybersecurity Problem
Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-42258
PUBLISHED: 2021-10-22
BQE BillQuick Web Suite 2018 through 2021 before 22.0.9.1 allows SQL injection for unauthenticated remote code execution, as exploited in the wild in October 2021 for ransomware installation. SQL injection can, for example, use the txtID (aka username) parameter. Successful exploitation can include ...
CVE-2020-28968
PUBLISHED: 2021-10-22
Draytek VigorAP 1000C contains a stored cross-site scripting (XSS) vulnerability in the RADIUS Setting - RADIUS Server Configuration module. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the username input field.
CVE-2020-28969
PUBLISHED: 2021-10-22
Aplioxio PDF ShapingUp 5.0.0.139 contains a buffer overflow which allows attackers to cause a denial of service (DoS) via a crafted PDF file.
CVE-2020-36485
PUBLISHED: 2021-10-22
Portable Ltd Playable v9.18 was discovered to contain an arbitrary file upload vulnerability in the filename parameter of the upload module. This vulnerability allows attackers to execute arbitrary code via a crafted JPEG file.
CVE-2020-36486
PUBLISHED: 2021-10-22
Swift File Transfer Mobile v1.1.2 and below was discovered to contain a cross-site scripting (XSS) vulnerability via the 'path' parameter of the 'list' and 'download' exception-handling.