There are 8 new vulnerabilities in Intel processor, and 4 are serious threats.

category:Internet
 There are 8 new vulnerabilities in Intel processor, and 4 are serious threats.


German IT website CT first reported the matter and said it had obtained all the technical details from the researchers and verified it. In addition, Intel has confirmed the existence of these vulnerabilities and listed them in the CommonVulnerabiltiesandExposures. The new hardware vulnerability has been named SpectreNewGeneration, and Intel believes that 4 of the 8 vulnerabilities are seriously threatened and the rest belong to a medium threat. Intel is developing patches for them. CT reports that one of the new vulnerabilities is more serious than the original Spectre vulnerability because it can be used to bypass virtual machine isolation and steal sensitive data such as password and digital keys from the cloud host system. Regardless of whether Intels software protection extension (SGX) is enabled, SpectreNewGeneration vulnerabilities can be exploited. Security researchers at Google ProjectZero team are believed to have identified one of the SpectreNewGeneration vulnerabilities. They may release technical details next week, and there will be a strict 90 day secrecy period to give suppliers time to solve problems. For Intel and its technical partners (such as Microsoft), it is always difficult to cope with the Spectre and Meltdown vulnerabilities on the processor, because after the application of a microcode patch, the user reporting system is unstable and the performance is slow. These vulnerabilities stem from hardware design flaws and allow attackers to read data in memory. Thousands of new and old processors are vulnerable to vulnerabilities. Intel has promised to restructure its processor to prevent the recurrence of Spectre and Meltdown vulnerabilities. (small) source of this article: NetEase science and technology report editor: Wang Fengzhi _NT2541 Security researchers at Google ProjectZero team are believed to have identified one of the SpectreNewGeneration vulnerabilities. They may release technical details next week, and there will be a strict 90 day secrecy period to give suppliers time to solve problems. For Intel and its technical partners (such as Microsoft), it is always difficult to cope with the Spectre and Meltdown vulnerabilities on the processor, because after the application of a microcode patch, the user reporting system is unstable and the performance is slow.