Hertzbleed Attack Impacting Intel & AMD CPUs
Contents
Summary Of The Attack
- A group of researchers from the University of Texas, the University of Illinois Urbana-Champaign, and the University of Washington, have published an article on their website about a new attack they developed called Hertzbleed.
- Manufacturers Intel and AMD have confirmed that their processors are affected by the Hertzbleed attack.
- This attack is listed in the Common Vulnerabilities and Exposures (CVE) system as CVE 2022-24436 for Intel and 2022-23823 for AMD CPU.
- Neither Intel nor AMD are releasing patches to fix the problem, claim the researchers on their website.
- Neither company responded to questions posed by New Scientist.
Stay Up-To-Date On The Latest Attacks
Be the first to know when our experts release new insights on the top attacks.
You're on the list! Just one more step...
Check your email to confirm your subscription.
What Is The Hertzbleed Attack?
In June 2022, a group of researchers from the University of Texas, the University of Illinois Urbana-Champaign, and the University of Washington, have published an article on their website about a new attack they developed called Hertzbleed.
This attack allows attackers to detect variations in the frequency of CPU using something called Dynamic voltage and frequency scaling or DVFS in short, and steal entire cryptographic keys in that way.
What Is Dynamic Voltage And Frequency Scaling (DVFS)?
DVFS throttles CPUs so they do not go beyond their thermal or performance limits during high workloads. It also reduces power consumption.
As the researchers explain on their website, they prove that attacks can be remotely converted into timing attacks via the power side channel.
This method can be classified as a hardware attack, which is an attack that exploits security holes or other specific vulnerabilities in the hardware.
There are many attacks of this type, but almost all of them require direct access to the target computer – or only to a specific chip. However, Hertzbleed can operate remotely.
Free Security Policy Templates
Get a step ahead of your cybersecurity goals with our comprehensive templates.
Who Is Impacted By This Attack?
Intel’s security advisory states that all Intel processors are affected. We have experimentally confirmed that several Intel processors are affected, including desktop and laptop models from the 8th to the 11th generation Core microarchitecture.
AMD’s security advisory states that several of their desktop, mobile and server processors are affected.
We have experimentally confirmed that AMD Ryzen processors are affected, including desktop and laptop models of the Zen 2 and Zen 3 microarchitectures.
Other processor manufacturers (e.g., ARM) also implement frequency scaling in their products and have been made aware of Hertzbleed.
However, we have not confirmed whether they are affected by Hertzbleed or not.
This attack is listed in the Common Vulnerabilities and Exposures (CVE) system as CVE 2022-24436 for Intel and CVE 2022-23823 for AMD CPUs.
Both Intel and AMD have announced that this vulnerability affects their processors and can be exploited with relatively low privileges.
Both AMD and Intel have stated that they do not intend to release patches as they believe the attacks are not practical outside of a lab environment.
How To Mitigate The Hertzbleed Attack
Both Intel and AMD have provided mitigation assistance by explaining that developers can use masking, hiding, or key rotation to protect against performance analysis-based frequency side-channel attacks.
The researchers also note that you can disable this feature on Intel CPUs with Turbo Boost and AMD CPUs with Turbo Core or Precision Boost, as it is basically DVFS with a user-friendly name.
However, keep in mind that this can affect your PC’s performance, and Intel stated that the attack is still possible even if you disable this feature.
When attacks that watched for changes in a chip’s speed, or frequency, were first discovered in the late 1990s, there was a common fix: write code that only used “time invariant” instructions – that is, instructions that take the same time to carry out regardless of what data is being processed.
This stopped an observer from gaining knowledge that helped them read data. But Hertzbleed can get around this strategy and can be done remotely.
Because this attack relies on the normal operation of a chip feature, not a bug, it could prove tricky to fix.
The researchers say that a solution would be to turn off the CPU throttling feature on all chips, globally, but warn that doing so would “significantly impact performance” and that it may not be possible to fully stop frequency changes on some chips.
Article by
Share This Article
Our Editorial Process
Our content goes through a rigorous approval process which is reviewed by cybersecurity experts – ensuring the quality and accuracy of information published.
Categories
The Breach Report
Our team of security researchers analyze recent cyber attacks, explain the impact, and provide actionable steps to keep you ahead of the trends.