Jump to content

Intel hit with another attack (SWAPGS)

LukeSavenije

Sources: @valdyrgramroverclock3d

 

Researchers over at Bitdefender have uncovered a new side-channel attack which impacts Intel x86 processors from Sandy Bridge (2011) and up. This new Speculative Execution attack is called SWAPGS, and has been designated the CVE-2019-1125 name. 

 

Quote

Bitdefender has claimed that it has "worked with Intel for more than a year" before publically disclosing this new attack, stating that "the SWAPGS Attack affects newer Intel CPUs that use speculative execution". Red Hat has additionally claimed that vulnerability applies to x86-64 systems which use "either Intel or AMD processors". 

SWAPGS allows attackers to gain access to information that's stored in kernel memory, which could extend to passwords, encryption keys and other pieces of important information. This vulnerability is said to only be available to local attackers, with the Linux OS being considered more secure from the vulnerability than Windows. 

Users of Windows 10 should update their OS to ensure that their systems remain secure. On July 9th, Microsoft released an OS update that's designed to mitigate the effects of SWAPGS by changing how processors speculatively access memory. 

 

Quote

AMD is aware of new research claiming new speculative execution attacks that may allow access to privileged kernel data. Based on external and internal analysis, AMD believes it is not vulnerable to the SWAPGS variant attacks because AMD products are designed not to speculate on the new GS value following a speculative SWAPGS. For the attack that is not a SWAPGS variant, the mitigation is to implement our existing recommendations for Spectre variant 1.

 

Link to comment
Share on other sites

Link to post
Share on other sites

Again, another local access only exploit that 99% of people don't have to worry about and likely would be better without the performance penalty from rushed mitigations.

Personal Desktop":

CPU: Intel Core i7 10700K @5ghz |~| Cooling: bq! Dark Rock Pro 4 |~| MOBO: Gigabyte Z490UD ATX|~| RAM: 16gb DDR4 3333mhzCL16 G.Skill Trident Z |~| GPU: RX 6900XT Sapphire Nitro+ |~| PSU: Corsair TX650M 80Plus Gold |~| Boot:  SSD WD Green M.2 2280 240GB |~| Storage: 1x3TB HDD 7200rpm Seagate Barracuda + SanDisk Ultra 3D 1TB |~| Case: Fractal Design Meshify C Mini |~| Display: Toshiba UL7A 4K/60hz |~| OS: Windows 10 Pro.

Luna, the temporary Desktop:

CPU: AMD R9 7950XT  |~| Cooling: bq! Dark Rock 4 Pro |~| MOBO: Gigabyte Aorus Master |~| RAM: 32G Kingston HyperX |~| GPU: AMD Radeon RX 7900XTX (Reference) |~| PSU: Corsair HX1000 80+ Platinum |~| Windows Boot Drive: 2x 512GB (1TB total) Plextor SATA SSD (RAID0 volume) |~| Linux Boot Drive: 500GB Kingston A2000 |~| Storage: 4TB WD Black HDD |~| Case: Cooler Master Silencio S600 |~| Display 1 (leftmost): Eizo (unknown model) 1920x1080 IPS @ 60Hz|~| Display 2 (center): BenQ ZOWIE XL2540 1920x1080 TN @ 240Hz |~| Display 3 (rightmost): Wacom Cintiq Pro 24 3840x2160 IPS @ 60Hz 10-bit |~| OS: Windows 10 Pro (games / art) + Linux (distro: NixOS; programming and daily driver)
Link to comment
Share on other sites

Link to post
Share on other sites

Jayzuz fuck, 2 more years and my 3570K will perform worse than a Netburst Pentium 4. 

mY sYsTeM iS Not pErfoRmInG aS gOOd As I sAW oN yOuTuBe. WhA t IS a GoOd FaN CuRVe??!!? wHat aRe tEh GoOd OvERclok SeTTinGS FoR My CaRd??  HoW CaN I foRcE my GpU to uSe 1o0%? BuT WiLL i HaVE Bo0tllEnEcKs? RyZEN dOeS NoT peRfORm BetTer wItH HiGhER sPEED RaM!!dId i WiN teH SiLiCON LotTerrYyOu ShoUlD dEsHrOuD uR GPUmy SYstEm iS UNDerPerforMiNg iN WarzONEcan mY Pc Run WiNdOwS 11 ?woUld BaKInG MY GRaPHics card fIX it? MultimETeR TeSTiNG!! aMd'S GpU DrIvErS aRe as goOD aS NviDia's YOU SHoUlD oVERCloCk yOUR ramS To 5000C18

 

Link to comment
Share on other sites

Link to post
Share on other sites

YUS more Intel FX processors!  They share vulnerabilities, not Floating Point Units however.

Workstation Laptop: Dell Precision 7540, Xeon E-2276M, 32gb DDR4, Quadro T2000 GPU, 4k display

Wifes Rig: ASRock B550m Riptide, Ryzen 5 5600X, Sapphire Nitro+ RX 6700 XT, 16gb (2x8) 3600mhz V-Color Skywalker RAM, ARESGAME AGS 850w PSU, 1tb WD Black SN750, 500gb Crucial m.2, DIYPC MA01-G case

My Rig: ASRock B450m Pro4, Ryzen 5 3600, ARESGAME River 5 CPU cooler, EVGA RTX 2060 KO, 16gb (2x8) 3600mhz TeamGroup T-Force RAM, ARESGAME AGV750w PSU, 1tb WD Black SN750 NVMe Win 10 boot drive, 3tb Hitachi 7200 RPM HDD, Fractal Design Focus G Mini custom painted.  

NVIDIA GeForce RTX 2060 video card benchmark result - AMD Ryzen 5 3600,ASRock B450M Pro4 (3dmark.com)

Daughter 1 Rig: ASrock B450 Pro4, Ryzen 7 1700 @ 4.2ghz all core 1.4vCore, AMD R9 Fury X w/ Swiftech KOMODO waterblock, Custom Loop 2x240mm + 1x120mm radiators in push/pull 16gb (2x8) Patriot Viper CL14 2666mhz RAM, Corsair HX850 PSU, 250gb Samsun 960 EVO NVMe Win 10 boot drive, 500gb Samsung 840 EVO SSD, 512GB TeamGroup MP30 M.2 SATA III SSD, SuperTalent 512gb SATA III SSD, CoolerMaster HAF XM Case. 

https://www.3dmark.com/3dm/37004594?

Daughter 2 Rig: ASUS B350-PRIME ATX, Ryzen 7 1700, Sapphire Nitro+ R9 Fury Tri-X, 16gb (2x8) 3200mhz V-Color Skywalker, ANTEC Earthwatts 750w PSU, MasterLiquid Lite 120 AIO cooler in Push/Pull config as rear exhaust, 250gb Samsung 850 Evo SSD, Patriot Burst 240gb SSD, Cougar MX330-X Case

 

Link to comment
Share on other sites

Link to post
Share on other sites

https://www.forbes.com/sites/daveywinder/2019/08/06/microsoft-confirms-new-windows-cpu-attack-vulnerability--advises-all-users-to-update-now/#69ee6f1e73f8

 

"We call this the SWAPGS attack because the vulnerability leverages the SWAPGS instruction," Bogdan Botezatu, director of threat research and reporting at Bitdefender, says "an under-documented instruction that makes the switch between user-owned memory and kernel memory." Botezatu also says that, at this point, "all Intel CPUs manufactured between 2012 and today are vulnerable to the SWAPGS attack." Which means every Intel chip going back to the "Ivy Bridge" processor is vulnerable if inside a machine running Windows.

 

but see, 

"I don’t think this is going to be leveraged into a Wannacry or Notpetya level of attack," Thornton-Trump says, "and I don’t think it will be adopted by cyber-criminals with financial motivations." These are the sort of vulnerabilities that “Government Cloud” and “Military Mega-Cloud” projects should be aware of, according to Thornton-Trump.  “For people with sensitive data in virtual environments these sorts of exploits need to be considered in the threat model,” he concludes, “for the rest of us, we have far worse issues to deal with.”

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

46 minutes ago, Princess Luna said:

Again, another local access only exploit that 99% of people don't have to worry about and likely would be better without the performance penalty from rushed mitigations.

Can you elaborate on this? I presume "local access" does not mean "physical access" to the machine?

Link to comment
Share on other sites

Link to post
Share on other sites

6 minutes ago, SPARTAN VI said:

Can you elaborate on this? I presume "local access" does not mean "physical access" to the machine?

It does, either the machine itself or in some cases the local network it is on, either ways someone in Russia won't be able to "hack" you in California using this.

Personal Desktop":

CPU: Intel Core i7 10700K @5ghz |~| Cooling: bq! Dark Rock Pro 4 |~| MOBO: Gigabyte Z490UD ATX|~| RAM: 16gb DDR4 3333mhzCL16 G.Skill Trident Z |~| GPU: RX 6900XT Sapphire Nitro+ |~| PSU: Corsair TX650M 80Plus Gold |~| Boot:  SSD WD Green M.2 2280 240GB |~| Storage: 1x3TB HDD 7200rpm Seagate Barracuda + SanDisk Ultra 3D 1TB |~| Case: Fractal Design Meshify C Mini |~| Display: Toshiba UL7A 4K/60hz |~| OS: Windows 10 Pro.

Luna, the temporary Desktop:

CPU: AMD R9 7950XT  |~| Cooling: bq! Dark Rock 4 Pro |~| MOBO: Gigabyte Aorus Master |~| RAM: 32G Kingston HyperX |~| GPU: AMD Radeon RX 7900XTX (Reference) |~| PSU: Corsair HX1000 80+ Platinum |~| Windows Boot Drive: 2x 512GB (1TB total) Plextor SATA SSD (RAID0 volume) |~| Linux Boot Drive: 500GB Kingston A2000 |~| Storage: 4TB WD Black HDD |~| Case: Cooler Master Silencio S600 |~| Display 1 (leftmost): Eizo (unknown model) 1920x1080 IPS @ 60Hz|~| Display 2 (center): BenQ ZOWIE XL2540 1920x1080 TN @ 240Hz |~| Display 3 (rightmost): Wacom Cintiq Pro 24 3840x2160 IPS @ 60Hz 10-bit |~| OS: Windows 10 Pro (games / art) + Linux (distro: NixOS; programming and daily driver)
Link to comment
Share on other sites

Link to post
Share on other sites

6 minutes ago, Princess Luna said:

It does, either the machine itself or in some cases the local network it is on, either ways someone in Russia won't be able to "hack" you in California using this.

Why does it require "physical access" to the machine? Of the two articles I've read, both mention the requirement to run a specifically crafted application. If the attack vector is to run the exploit's software, I don't see why "physical access" is necessary. Maybe by "local access" they mean, local admin rights? 

Link to comment
Share on other sites

Link to post
Share on other sites

3 minutes ago, SPARTAN VI said:

I don't see why "physical access" is necessary

It isn't, @Princess Luna is incorrect. Only the ability to run code at the target is required, whether it is by physical access or by e.g. tricking the target's owner to run malicious executable.

Hand, n. A singular instrument worn at the end of the human arm and commonly thrust into somebody’s pocket.

Link to comment
Share on other sites

Link to post
Share on other sites

36 minutes ago, gabrielcarvfer said:

Meltdown, Spectre, Zombieload, Spoiler, Foreshadow, SWAPGS, RIDL and Fallout (MDS), ...

 

Yeah, it's almost like when one major vulnerability is found everyone else starts probing the same area to look for more.

Main Rig:-

Ryzen 7 3800X | Asus ROG Strix X570-F Gaming | 16GB Team Group Dark Pro 3600Mhz | Corsair MP600 1TB PCIe Gen 4 | Sapphire 5700 XT Pulse | Corsair H115i Platinum | WD Black 1TB | WD Green 4TB | EVGA SuperNOVA G3 650W | Asus TUF GT501 | Samsung C27HG70 1440p 144hz HDR FreeSync 2 | Ubuntu 20.04.2 LTS |

 

Server:-

Intel NUC running Server 2019 + Synology DSM218+ with 2 x 4TB Toshiba NAS Ready HDDs (RAID0)

Link to comment
Share on other sites

Link to post
Share on other sites

9 minutes ago, WereCatf said:

It isn't, @Princess Luna is incorrect. Only the ability to run code at the target is required, whether it is by physical access or by e.g. tricking the target's owner to run malicious executable.

Oh yes because we're still on the days of downloading shady content from shady spam emails.... circles eyes

Personal Desktop":

CPU: Intel Core i7 10700K @5ghz |~| Cooling: bq! Dark Rock Pro 4 |~| MOBO: Gigabyte Z490UD ATX|~| RAM: 16gb DDR4 3333mhzCL16 G.Skill Trident Z |~| GPU: RX 6900XT Sapphire Nitro+ |~| PSU: Corsair TX650M 80Plus Gold |~| Boot:  SSD WD Green M.2 2280 240GB |~| Storage: 1x3TB HDD 7200rpm Seagate Barracuda + SanDisk Ultra 3D 1TB |~| Case: Fractal Design Meshify C Mini |~| Display: Toshiba UL7A 4K/60hz |~| OS: Windows 10 Pro.

Luna, the temporary Desktop:

CPU: AMD R9 7950XT  |~| Cooling: bq! Dark Rock 4 Pro |~| MOBO: Gigabyte Aorus Master |~| RAM: 32G Kingston HyperX |~| GPU: AMD Radeon RX 7900XTX (Reference) |~| PSU: Corsair HX1000 80+ Platinum |~| Windows Boot Drive: 2x 512GB (1TB total) Plextor SATA SSD (RAID0 volume) |~| Linux Boot Drive: 500GB Kingston A2000 |~| Storage: 4TB WD Black HDD |~| Case: Cooler Master Silencio S600 |~| Display 1 (leftmost): Eizo (unknown model) 1920x1080 IPS @ 60Hz|~| Display 2 (center): BenQ ZOWIE XL2540 1920x1080 TN @ 240Hz |~| Display 3 (rightmost): Wacom Cintiq Pro 24 3840x2160 IPS @ 60Hz 10-bit |~| OS: Windows 10 Pro (games / art) + Linux (distro: NixOS; programming and daily driver)
Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, Princess Luna said:

Oh yes because we're still on the days of downloading shady content from shady spam emails.... circles eyes

Are you trying to imply that that doesn't happen?

Hand, n. A singular instrument worn at the end of the human arm and commonly thrust into somebody’s pocket.

Link to comment
Share on other sites

Link to post
Share on other sites

3 minutes ago, Princess Luna said:

Oh yes because we're still on the days of downloading shady content from shady spam emails.... circles eyes

 

1 minute ago, WereCatf said:

Are you trying to imply that that doesn't happen?

If that's the most obvious attack vector, I could see an uncautious user grabbing an infected application via torrent. How many thousands of people download bootlegged games and applications (e.g. Photoshop) every day? Is it not feasible for a black hat to seed an infected variant of those applications? ?

Link to comment
Share on other sites

Link to post
Share on other sites

I still haven't updated my BIOS to patch the S/M vulnerabilities. I paid good money for that ~10% performance, damnit, and I'm going to keep it. Personally IDGAF about these vulnerabilities because not being an idiot on the Internet or my network hasn't failed me for decades.

Current Build:

CPU: Ryzen 7 5800X3D

GPU: RTX 3080 Ti FE

RAM: 32GB G.Skill Trident Z CL16 3200 MHz

Mobo: Asus Tuf X570 Plus Wifi

CPU Cooler: NZXT Kraken X53

PSU: EVGA G6 Supernova 850

Case: NZXT S340 Elite

 

Current Laptop:

Model: Asus ROG Zephyrus G14

CPU: Ryzen 9 5900HS

GPU: RTX 3060

RAM: 16GB @3200 MHz

 

Old PC:

CPU: Intel i7 8700K @4.9 GHz/1.315v

RAM: 32GB G.Skill Trident Z CL16 3200 MHz

Mobo: Asus Prime Z370-A

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, SPARTAN VI said:

If that's the most obvious attack vector, I could see an uncautious user grabbing an infected application via torrent. How many thousands of people download bootlegged games and applications (e.g. Photoshop) every day? Is it not feasible for a black hat to seed an infected variant of those applications? ?

People are constantly downloading random shit, including Excel-files and whatnot being sent to them, whether it is by instant-messages, Facebook-posts, email etc. All one has to do is look at any recent security breach news and the most likely reason it happened is because someone downloaded and executed something they shouldn't have.

Hand, n. A singular instrument worn at the end of the human arm and commonly thrust into somebody’s pocket.

Link to comment
Share on other sites

Link to post
Share on other sites

15 minutes ago, WereCatf said:

People are constantly downloading random shit, including Excel-files and whatnot being sent to them, whether it is by instant-messages, Facebook-posts, email etc. All one has to do is look at any recent security breach news and the most likely reason it happened is because someone downloaded and executed something they shouldn't have.

only takes 1 for security risk on the network right?

Link to comment
Share on other sites

Link to post
Share on other sites

35 minutes ago, Princess Luna said:

Oh yes because we're still on the days of downloading shady content from shady spam emails.... circles eyes

thats exactly how wannacry infects comuputers/local networks

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, TopHatProductions115 said:

I wonder if x58 Xeons are affected ?

in theory they're not

 

but you never know...

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, WereCatf said:

People are constantly downloading random shit, including Excel-files and whatnot being sent to them, whether it is by instant-messages, Facebook-posts, email etc. All one has to do is look at any recent security breach news and the most likely reason it happened is because someone downloaded and executed something they shouldn't have.

True but I trust myself to not be easily fooled by something like that. Also I am the only one on my network so unless I mess up I won't be vulnerable. I dont get why people download things unless its nessisary and comes from secure source. 

Link to comment
Share on other sites

Link to post
Share on other sites

2 hours ago, Princess Luna said:

Oh yes because we're still on the days of downloading shady content from shady spam emails.... circles eyes

We are. There are still people falling for fake tech support scams. There is a reason that particular market is still around. Plenty of uneducated elderly users as well as younger kids will likely fall prey to these attacks as they do virtually every other malicious online exploit.

 

There is an old saying that goes "If you make something idiot-proof, they'll build a better idiot". It's applicable here.

My (incomplete) memory overclocking guide: 

 

Does memory speed impact gaming performance? Click here to find out!

On 1/2/2017 at 9:32 PM, MageTank said:

Sometimes, we all need a little inspiration.

 

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

7 hours ago, Levent said:

Jayzuz fuck, 2 more years and my 3570K will perform worse than a Netburst Pentium 4. 

That's...a long way to fall:
image.thumb.png.92a85701acbd2d0d76c2b159517710f6.png

"We also blind small animals with cosmetics.
We do not sell cosmetics. We just blind animals."

 

"Please don't mistake us for Equifax. Those fuckers are evil"

 

This PSA brought to you by Equifacks.
PMSL

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×