5W1H: Speculative Side Channel Vulnerabilities De-mystified

Share and earn Cybytes
Facebook Twitter LinkedIn Email

<p>The classes of vulnerabilities that brought us Meltdown and Spectre are not going away anytime soon. Here’s what you need to know about Speculative Execution vulnerabilities, with our guidance on steps you can take to reduce your risk.</p>
<p>Spectre and Meltdown generated a lot of confusion and discussion in the security world when they first hit the news. Understanding the risks associated with speculative execution vulnerabilities will help organizations prioritize and communicate effectively about their exposure. In this post, we present what it is known, how it affects companies and ways to stay ahead in the game.</p>
<h2>Start from the beginning…</h2>
<p>Speculative Execution is a technique used to enhance processor performance by anticipating which instructions will be required in advance. <a href=”https://newsroom.intel.com/wp-content/uploads/sites/11/2018/01/Intel-Ana… to Intel</a>, this helps minimize latency and extract greater parallelism, thereby leading to performance gains.The boost in performance comes with a tradeoff: results will be discarded if they are not needed. The technique is used by various microprocessor vendors including Intel, AMD and ARM.</p>
<p>While academic papers dating back to 1985 have covered theoretical attacks on CPU caches and translation lookaside buffers (TLBs), <a href=”https://bugzilla.redhat.com/show_bug.cgi?id=1519780#c0″>rumors</a> about the existence of vulnerabilities in the wild that leveraged Speculative Execution began surfacing in late 2017. However, the real saga began publicly on January 3, 2018 when a blog post from <a href=”https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory…’s Project Zero Initiative</a> detailed their findings. <a href=”https://www.tenable.com/blog/the-first-major-security-logos-of-2018-spec… “>Spectre and Meltdown were unleashed to the public</a> just as people were coming back from their New Year holiday. The reports included three variants of the vulnerabilities: CVE-2017-5753 (Variant 1) and CVE-2017-5715 (Variant 2) for <a href=”https://spectreattack.com/spectre.pdf”>Spectre</a> and CVE-2017-5754 (Variant 3) for <a href=”https://meltdownattack.com/meltdown.pdf”>Meltdown</a>. </p>
<p>This mega-event sparked a huge discussion in the community for various reasons: the impact of the vulnerabilities themselves; the number of vendors affected directly and indirectly at various levels of the supply chain; the sheer number of systems impacted worldwide; and the mammoth task of getting these systems updated (if at all possible). Clearly, Pandora’s box had been opened and there was no going back. Pundits predicted (accurately!) we would see more of these in the months and years to come. </p>
<p>In late May 2018, two more vulnerabilities were discovered and reported by <a href=”https://www.intel.com/content/www/us/en/security-center/advisory/intel-s… and Google</a>. These were tagged Variant 3A (CVE-2018-3640) and Variant 4 (CVE-2018-3639). The <a href=”https://www.tenable.com/blog/spectre-and-meltdown-still-haunting-intelamd “>fourth variant</a> presented a new method for leaking information from a system and could be exploited from a browser, thereby enhancing the ease of exploitation. These variants are part of eight additional Spectre-class flaws provisionally named Spectre-NG. </p>
<p>Soon to follow were other flaws from the Spectre-NG class: Lazy FP State Restore (CVE-2018-3665); Bounds Check Bypass Store (BCBS) aka Spectre 1.1 (CVE-2018-3693); Spectre 1.2; ret2spec (aka Spectre v5); and SpectreRSB (Return Stack Buffer).</p>
<p>In July 2018, <a href=”https://mlq.me/download/netspectre.pdf”>NetSpectre</a> surfaced and changed the scope in terms of exploitability of the Spectre family: a remote attack was now possible. By virtue of this new vulnerability, reported by researchers of the Graz University of Technology, an exposed Network Interface or API would be enough for an attacker to execute the remote side-channel attack. NetSpectre is capable of leaking information from the target system and even though the rate of transmission is low (around 15 to 60 bits per hour in a local network) it is still proof that novel variations of speculative execution can target a broad range of devices.</p>
<p>Most recently, on August 14, a new set of vulnerabilities dubbed <a href=”https://foreshadowattack.eu/”>Foreshadow</a> and Foreshadow-NG were made public. The new set of vulnerabilities exploiting a <a href=”https://www.tenable.com/blog/foreshadow-speculative-execution-attack-tar… attack causing a L1 Terminal Fault</a> could affect processors, Virtual Machines and Cloud environments. These vulnerabilities can be triggered when accessing a linear or logical address that is not mapped to a physical location on the hardware resulting in a Terminal Fault. </p>
<h2>So what difference does it make?</h2>
<p>Spectre and Meltdown opened a broad discussion in regards to the current state of security and their implications. With the remarkably large number of systems vulnerable to speculative execution attacks, and the closing gap between Proofs of Concepts and <a href=”https://blog.malwarebytes.com/security-world/2018/01/meltdown-and-spectr…, it’s imperative for security teams and companies collaborate to keep an eye on and be aware of the evolution of these threats.</p>
<p>Speculative Execution vulnerabilities not only affect microprocessor manufacturers, but the whole security community. Some of the discovered vulnerabilities will not be fully patched until new architectures are developed and deployed, which will take a few years to happen. More vulnerabilities will be discovered in the upcoming months and years expanding on the current attack vectors. </p>
<h2>Why is this important?</h2>
<ul><li>The Spectre and Meltdown vulnerabilities affect a very large number and wide range of devices, including computers, mobile devices and servers. Given the widespread nature, it is certain all affected systems will never be actually patched. </li>
<li>These classes of vulnerabilities are not going away anytime soon. While some of these vulnerabilities have been mitigated by software patches provided by different vendors, this has come at the cost of performance, and, in some cases, holistic fixes have required architectural changes.</li>
<li>New, but related vulnerabilities will be discovered, unveiling novel types of attacks that might not be possible to patch via software alone.</li></ul>
<h2>What you can do…</h2>
<p>Keeping up to date with information on new vulnerabilities and mitigating them via software patches or microcode provides a first line of defense. </p>
<p>Knowing how you are exposed can help to manage and mitigate risks associated with vulnerabilities. By visualizing, analyzing and measuring cyber risk, one can confidently manage and reduce it to an acceptable level. </p>
<p>Security teams must become proactive to close the gap between the publication of a new vulnerability and becoming aware that it is present in their ecosystem. As per <a href=”https://www.tenable.com/cyber-exposure/attackers-advantage”>Tenable Research’s report</a> on the Attacker’s Advantage, 34% of the analyzed vulnerabilities had an exploit available on the day they were disclosed. Teams willing to protect their organization’s infrastructure can be a step ahead of the curve and reduce the seveday window of opportunity attackers have to exploit a given vulnerability. </p>
<p>On our part, we will keep you updated on the saga of speculative side channel vulnerabilities as things evolve. Stay tuned! </p>
<h2>Learn more:</h2>
<ul><li><a href=”https://www.darkreading.com/attacks-breaches/new-side-channel-attacks-ta… Side-Channel Attacks Target Graphics Processing Units</a></li>
<li><a href=”https://www.zdnet.com/article/intel-cpus-impacted-by-new-portsmash-side-… CPUs impacted by new PortSmash side-channel vulnerability</a></li></ul>
<p><b><i>Learn more about <a href=”https://www.tenable.com/products”>Tenable</a>, the first Cyber Exposure platform for holistic management of your modern attack surface. Get a <a href=”https://www.tenable.com/products/tenable-io/vulnerability-management/eva… 60-day trial</a> of Tenable.io Vulnerability Management. </i></b></p>

Share this post and earn Cybytes
Facebook Twitter LinkedIn Email
About Tenable
Tenable™, Inc. is the Cyber Exposure company. Over 24,000 organizations of all sizes around the globe rely on Tenable to manage and measure their modern attack surface to accurately understand and reduce cyber risk. As the creator of Nessus®, Tenable built its platform from the ground up to deeply understand assets, networks and vulnerabilities, extending this knowledge and expertise into Tenable.io™ to deliver the world’s first platform to provide live visibility into any asset on any computing platform. Tenable customers include over 50 percent of the Fortune 500, large government agencies and organizations across the private and public sectors. Learn more at tenable.com.
Promoted Content
Five Steps to Building a Successful Vulnerability Management Program
Is your vulnerability management program struggling? Despite proven technology solutions and the best efforts of IT teams, unresolved vulnerabilities remain an ongoing source of friction and frustration in many organizations. Regardless of how many vulnerabilities are fixed, there will always be vulnerabilities that can’t easily be remediated – and too often, finger-pointing between IT teams and business groups can ensue.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play

Support Cybrary

Donate Here to Get This Month's Donor Badge

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?