March 18, 2020 By Shane Schick 2 min read

Intel processors, including Core and Xeon products, are susceptible to attacks described as Snoop-assisted L1 data sampling, a security investigator has discovered.

Described in a deep-dive report published to warn software developers, Intel said the Snoop attacks were first brought to light by a software engineer.

The attacks allow bad actors to insert malicious code after a change in the L1D cache, at which point the CPU updates all cache levels in a process known as bus snooping. The L1 data sampling technique could then trigger errors to leak data from the CPU’s inner memory.

Cybercriminal Activity at the Cache Level

On a more technical level, the Snoop attacks are taking advantage of cache coherence, which ensures that the L1D cache is using data that is consistent with whatever has been stored across L1, L2 and L3 caches, along with the RAM. This is common in many of the multi-core architectures that run within server environments today, the report noted.

Companies are able to set up virtualized IT infrastructure and cloud computing environments, in part, because of the multi-core capabilities of modern chips made by hardware developers like Intel. If malware that infects a CPU via Snoop attacks leaks data from other cores, however, a single attack could have significant consequences.

On the other hand, it’s important to recognize that Snoop attacks are largely theoretical at this point. The Intel report said that creating the real-world conditions necessary to carry out the technique would be difficult.

Unlike some of the other vulnerabilities affecting Intel processors, such as Spectre and Meltdown, Intel said a Snoop attack would be unlikely to steal much data that cybercriminals could use.

Apply the Foreshadow Patches

Fortunately, Intel said those who might be affected by the vulnerability would be able to protect themselves by applying patches released two years ago, dubbed Foreshadow (L1TF). Turning off a feature in Intel CPUs known as Transactional Synchronization Extensions (TSX) will also make Snoop attacks harder to pull off, the company said.

Just in case, companies should also ensure they have backed up all data properly and invest in threat intelligence to stay aware of hardware vulnerabilities like L1 data sampling as they emerge.

More from

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today