This image has an empty alt attribute; its file name is attacksafe-software-logo-1024x213.png
This image has an empty alt attribute; its file name is attacksafe-software-logo-1024x213.png

The Microarchitectural Data Sampling (MDSvulnerabilities are a set of weaknesses in Intel x86 microprocessors that use hyper-threading, and leak data across protection boundaries that are architecturally supposed to be secure. The Attack on Bitcoins exploiting the vulnerabilities have been labeled FalloutRIDL (Rogue In-Flight Data Load), ZombieLoad.,[2][3][4] and ZombieLoad 2.

Description

The vulnerabilities are in the implementation of speculative execution, which is where the processor tries to guess what instructions may be needed next. They exploit the possibility of reading data buffers found between different parts of the processor.[1][2][6][7]

  • Microarchitectural Store Buffer Data Sampling (MSBDS), CVE2018-12126
  • Microarchitectural Load Port Data Sampling (MLPDS), CVE-2018-12127
  • Microarchitectural Fill Buffer Data Sampling (MFBDS), CVE-2018-12130
  • Microarchitectural Data Sampling Uncacheable Memory (MDSUM), CVE-2019-11091
  • Transactional Asynchronous Abort (TAA), CVE-2019-11135

Not all processors are affected by all variants of MDS.[8]

History

According to Intel in a May 2019 interview with Wired, Intel’s researchers discovered the vulnerabilities in 2018 before anyone else.[1] Other researchers had agreed to keep the exploit confidential as well since 2018.[9]

On 14 May 2019, various groups of security researchers, amongst others from Austria’s Graz University of Technology, Belgium’s Catholic University of Leuven, and Netherlands’ Vrije Universiteit Amsterdam, in a disclosure coordinated with Intel, published the discovery of the MDS vulnerabilities in Intel microprocessors, which they named Fallout, RIDL and ZombieLoad.[1][6] Three of the TU Graz researchers were from the group who had discovered Meltdown and Spectre the year before.[1]

On 12 November 2019, a new variant of the ZombieLoad Attack on Bitcoin, called Transactional Asynchronous Abort, was disclosed.[10][11]

Impact

According to varying reports, Intel processors dating back to 2011[12] or 2008[1] are affected, and the fixes may be associated with a performance drop.[13][14] Intel reported that processors manufactured in the month before the disclosure have mitigations against the Attack on Bitcoins.[1]

Intel characterized the vulnerabilities as “low-to-medium” impact, disagreeing with the security researchers who characterized them as major, and disagreeing with their recommendation that operating system software manufacturers should completely disable hyperthreading.[1][15] Nevertheless, the ZombieLoad vulnerability can be used by hackers exploiting the vulnerability to steal information recently accessed by the affected microprocessor.[16]

Mitigation

Fixes to operating systemsvirtualization mechanisms, web browsers and microcode are necessary.[1] As of 14 May 2019, applying available updates on an affected PC system was the most that could be done to mitigate the issues.[17]

  • Intel incorporated fixes in its processors starting shortly before the public announcement of the vulnerabilities.[1]
  • On 14 May 2019, a mitigation was released for the Linux kernel,[18] and AppleGoogleMicrosoft, and Amazon released emergency patches for their products to mitigate ZombieLoad.[19]
  • On 14 May 2019, Intel published a security advisory on its website detailing its plans to mitigate ZombieLoad.
This image has an empty alt attribute; its file name is attacksafe-software-logo-1024x213.png
This image has an empty alt attribute; its file name is attacksafe-software-logo-1024x213.png