Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

For privacy and security, think carefully before granting AI access to your personal data

Benchmark for Greptile’s Lead Series A lecture, AI Code Reviewer, valued at $100 million, according to sources

Why Y Combinator Startups Working on Windows AI Agents and Get Pivoted

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Researchers reveal flaws in new Intel CPUs that allow memory leaks and Specter V2 attacks
Identity

Researchers reveal flaws in new Intel CPUs that allow memory leaks and Specter V2 attacks

userBy userMay 16, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 16, 2025Ravi LakshmananHardware security/vulnerabilities

Researchers at EthZürich have discovered another security flaw that affects all modern Intel CPUs and leaks sensitive data from memory, indicating that a vulnerability known as Specter continues to haunt computer systems over seven years later.

A vulnerability known as Branch Privilege Injection (BPI) can be “exploited to exploit predicted calculations on the CPU (Central Processing Unit) in order to gain unauthorized access to information from other processor users,” says Eth Zurich.

Kaveh Razavi, head of Computer Security Group (COMSEC) and one of the research authors, said this drawback could affect all Intel processors, allowing bad actors to read working memory of another user on the same CPU as the contents of the processor’s cache.

Cybersecurity

The attack takes advantage of what is called the Branch Predictive Race Condition (BPRC) that comes up when a processor switches between predictive calculations for two users with different privileges, opening the door to a scenario where it can bypass the security barrier from the privileged process and utilize it to access sensitive information.

Intel has issued a microcode patch to address a vulnerability assigned the CVE identifier CVE-2024-45332 (CVSS V4 score: 5.7).

“They say that affecting the transient execution of indirect branch predictors of some Intel processors allows confidential information exposure caused by shared micro-work history predictors to potentially enable information disclosure via local access,” Intel said in an advisory released on May 13th.

This disclosure comes when researchers at Vrije Universiteit Amsterdam’s Systems and Network Security Group (VUSEC) detailed the Self-Training Spector V2 category in a codenamed training solo attack.

“Attackers can leak across control flows (e.g., kernel) and privilege boundaries within the same domain, allowing them to replicate classic Specter V2 scenarios without relying on a powerful sandboxed environment like EBPF,” says Vusec.

Cybersecurity

Hardware exploits tracked as CVE-2024-28956 and CVE-2025-24495 can leak kernel memory up to 17 kb/s for Intel CPUs. This study can completely destroy traditional user users, Guest-V2 attacks.

CVE-2024-28956 (CVSS V4 Score: 5.7) – Indirect Target Selection (ITS) affects Intel Core 9-11th and Intel Xeon 2nd-3rd. CVE-2025-24495 (CVSS V4 score: 6.8) – Lion Cove BPU problem affecting Intel CPUs with Lion Cove Core

Intel has sent out microcode updates for these defects, but AMD said it has corrected existing guidance on Specter and Meltdown, explicitly highlighting the risks associated with using Classic Berkeley Packet Filter (CBPF).

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleNuggets and Thunder set up an NBA showdown to win the winner in Game 7 | Football News
Next Article Conference Industry Association and Manchester Central will join All Party Parliament Group for the event
user
  • Website

Related Posts

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

July 18, 2025

China’s vast tools secretly extract from SMS, GPS data and confiscated mobile phones.

July 18, 2025

UNG0002 group hits Hong Kong China in Pakistan using LNK files and rats in twin campaign

July 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

For privacy and security, think carefully before granting AI access to your personal data

Benchmark for Greptile’s Lead Series A lecture, AI Code Reviewer, valued at $100 million, according to sources

Why Y Combinator Startups Working on Windows AI Agents and Get Pivoted

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.