Speculative Execution Vulnerability Affects Modern CPUs

CVE-2024-2193
Currently unrated 🤨

Key Information

Vendor
Amd
Status
Cpu
Xen
Vendor
CVE Published:
15 March 2024

Badges

👾 Exploit Exists📰 News Worthy

Summary

A speculative race condition (SRC) vulnerability, labeled as CVE-2024-2193, has been disclosed, affecting modern CPU architectures that support speculative execution and impacting AMD hardware. This vulnerability allows attackers to exploit race conditions to access speculative executable code paths and disclose arbitrary data from the CPU. The vulnerability can be exploited to leak information from a target software, and an exploitation technique called Inter-Process Interrupt (IPI) Storming has been developed to create an unbounded exploitation window, allowing attackers to execute an arbitrary number of attacks within a single race window. The vulnerability has been confirmed to affect all major hardware vendors and any software using conditional branches to determine whether to enter critical regions. Mitigation has been proposed, requiring minimal kernel changes and incurring only a minimal performance overhead. The vulnerability has been disclosed to major hardware vendors and the Linux kernel, with AMD explicitly stating that existing mitigations for Spectre-v1 apply. This vulnerability highlights the need for rigorous security measures and timely patching to protect against potential threats.

Affected Version(s)

CPU = See advisory AMD-SB-7016

Xen = consult Xen advisory XSA-453

News Articles

Timeline

  • 👾

    Exploit exists.

  • Vulnerability published.

  • First article discovered by vusec

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre Database4 News Article(s)

Credit

Thanks to Hany Ragab and Cristiano Giuffrida from the VUSec group at VU Amsterdam and Andrea Mambretti and Anil Kurmus from IBM Research Europe, Zurich for discovering and reporting this vulnerability.
.