
Researchers at EthZürich have discovered another security flaw that affects all modern Intel CPUs and leaks sensitive data from memory, indicating that a vulnerability known as Specter continues to haunt computer systems over seven years later.
A vulnerability known as Branch Privilege Injection (BPI) can be “exploited to exploit predicted calculations on the CPU (Central Processing Unit) in order to gain unauthorized access to information from other processor users,” says Eth Zurich.
Kaveh Razavi, head of Computer Security Group (COMSEC) and one of the research authors, said this drawback could affect all Intel processors, allowing bad actors to read working memory of another user on the same CPU as the contents of the processor’s cache.

The attack takes advantage of what is called the Branch Predictive Race Condition (BPRC) that comes up when a processor switches between predictive calculations for two users with different privileges, opening the door to a scenario where it can bypass the security barrier from the privileged process and utilize it to access sensitive information.
Intel has issued a microcode patch to address a vulnerability assigned the CVE identifier CVE-2024-45332 (CVSS V4 score: 5.7).
“They say that affecting the transient execution of indirect branch predictors of some Intel processors allows confidential information exposure caused by shared micro-work history predictors to potentially enable information disclosure via local access,” Intel said in an advisory released on May 13th.
This disclosure comes when researchers at Vrije Universiteit Amsterdam’s Systems and Network Security Group (VUSEC) detailed the Self-Training Spector V2 category in a codenamed training solo attack.
“Attackers can leak across control flows (e.g., kernel) and privilege boundaries within the same domain, allowing them to replicate classic Specter V2 scenarios without relying on a powerful sandboxed environment like EBPF,” says Vusec.

Hardware exploits tracked as CVE-2024-28956 and CVE-2025-24495 can leak kernel memory up to 17 kb/s for Intel CPUs. This study can completely destroy traditional user users, Guest-V2 attacks.
CVE-2024-28956 (CVSS V4 Score: 5.7) – Indirect Target Selection (ITS) affects Intel Core 9-11th and Intel Xeon 2nd-3rd. CVE-2025-24495 (CVSS V4 score: 6.8) – Lion Cove BPU problem affecting Intel CPUs with Lion Cove Core
Intel has sent out microcode updates for these defects, but AMD said it has corrected existing guidance on Specter and Meltdown, explicitly highlighting the risks associated with using Classic Berkeley Packet Filter (CBPF).
Source link