New Security Loophole Unearthed in AMD Processors
Researchers from the TU Graz and the Saarbrücken Helmholtz Center for Information Security (Cispa) have discovered a new security loophole in AMD processors that makes virtual work environments vulnerable. Various models of AMD’s ‘Epyc’ CPU range are affected. The chip giant has been informed and is providing an update to fix the vulnerability.
‘CacheWarp’ Attack: A New Threat to AMD Processors
The researchers have unearthed a vulnerability in the AMD processors that allows attackers to change data in virtual machines and penetrate them. The weakness pertains to the Trusted Computing technology AMD Secure Encrypted Virtualization (SEV), which encrypts the data of the virtual machine. The attack, dubbed ‘CacheWarp’ by the researchers, is based on the resetting of data changes in the cache, allowing attackers to establish an already authenticated session.
AMD’s Response: A Microcode Update
AMD has responded to the discovered vulnerability by working on a Microcode update. This move is aimed to rectify the vulnerability and safeguard virtual work environments from potential threats. The company is poised to release the update soon, demonstrating a proactive approach to security concerns.
Implications for Virtual Work Environments
This security loophole in AMD processors has severe implications for virtual work environments, which rely heavily on the integrity and security of their data. The discovery of the ‘CacheWarp’ attack underscores the need for continuous monitoring and updating of security protocols to protect against evolving cyber threats.
Subscribe to BNN Breaking
Sign up for our daily newsletter covering global breaking news around the world.