CacheWarp: New Threat to AMD’s Secure Encrypted Virtualization
A newly identified software-based attack named CacheWarp has targeted AMD’s Secure Encrypted Virtualization (SEV) technology, threatening the security of data on cloud services.
This discovery was made by researchers from CISPA and TU Graz.
CacheWarp: Unraveling the Vulnerability
CacheWarp exploits inconsistencies between cache lines and memory, disrupting the trustworthiness of SEV. It primarily targets the Hypervisor that hosts virtual machines.
By resetting data changes in the cache memory, CacheWarp can suggest an outdated system status, thereby gaining access to the virtual machine.
The attack could bypass the latest versions of SEV-ES (Encrypted State) and SEV-SNP (Secure Nested Paging), theoretically enabling comprehensive access and modification rights to data stored in cloud services. This vulnerability exposes encrypted virtual machines, posing a significant threat to data security.
AMD’s Response and Future Implications
AMD has reportedly addressed this issue with an update, closing the security gap. Despite the patch, the CacheWarp vulnerability emphasizes the need for continual vigilance and hardware-level fixes to ensure data security.
The discovery of CacheWarp serves as a reminder that even the most secure systems are not immune to potential threats.
Subscribe to BNN Breaking
Sign up for our daily newsletter covering global breaking news around the world.