Well this is bad. “Downfall” is the name Daniel Moghimi, a security expert at Google, has given to a new vulnerability he has discovered in several generations of Intel processors. Attackers can exploit the vulnerability and read data from other programs and memory areas. The vulnerability has already been reported as CVE-2022-40982 and Intel confirmed the flaw here .
Moghimi reported the vulnerability to Intel on August 24, 2022, but only made the vulnerability public today so that Intel had time to release microcode updates that can fix the vulnerability.
Intel’s ‘Downfall’ flaw is serious
Moghimi explains the vulnerability in detail on a dedicated Downfall website, including some examples. According to him, billions of Intel processors are affected, which are used in private user computers as well as in cloud servers. The expert describes the possible consequences of the gap as follows:
“This vulnerability, identified as CVE-2022-40982, enables a user to access and steal data from other users who share the same computer. For instance, a malicious app obtained from an app store could use the Downfall attack to steal sensitive information like passwords, encryption keys, and private data such as banking details, personal emails, and messages. Similarly, in cloud computing environments, a malicious customer could exploit the Downfall vulnerability to steal data and credentials from other customers who share the same cloud computer.”
Daniel Moghimi
How the Intel Downfall vulnerability works
While you should check out Moghimi’s Downfall page for more detailed information, here’s a high-level description of the bug:
“The vulnerability is caused by memory optimization features in Intel processors that unintentionally reveal internal hardware registers to software. This allows untrusted software to access data stored by other programs, which should not be normally be accessible.”
Daniel Moghimi
How to protect yourself from Intel Downfall
Intel is already providing microcode updates to plug the security hole. “Intel recommends that users of affected Intel Processors update to the latest version firmware provided by the system manufacturer that addresses these issues,” the company says.
This can lead to a loss of performance of up to 50 percent under certain circumstances, however, as Moghimi warns. Intel comments on the side effects of the microcode updates here. There’s an opt-out mechanism available to avoid applying the patch.
Which Intel processors are affected?
Both consumer and server processors from Intel show the gap. For consumers, all PCs or laptops with Intel Core processors of the 6th “Skylake” generation up to and including the 11th-gen “Tiger Lake” chips contain the vulnerability. This means that the vulnerability has existed since at least 2015, when Skylake was released.
Intel’s corresponding Xeon processors are also at risk to Downfall. Due to Intel’s dominant position in server processors, virtually every internet user could be affected, at least indirectly.
Intel has published a list of all affected processors here. You can read a detailed technical analysis by the Google security expert in this English-language PDF.
Intel’s newer 12th-gen and 13th-gen Core processors are not affected.
The downfall vulnerability now discovered is reminiscent of the legendary Meltdown and Spectre vulnerabilities from 2018.
This article was translated from German to English and originally appeared on pcwelt.de.