"CrossTalk" / SRBDS Is The Newest Side-Channel Vulnerability
Details are still coming in but INTEL-SA-00320, a.k.a. "CrossTalk", is the newest Intel side-channel CPU vulnerability.
This latest side-channel vulnerability was disclosed today as part of Intel's second Tuesday of the month reporting period along with several other security issues. INTEL-SA-00320 / CrossTalk is a Special Register Buffer Data Sampling "SRBDS" issue.
The whitepaper doesn't appear to be published yet by the independent researchers and the INTEL-SA-00320 deep dive page isn't yet working.
There have been motherboard vendors in recent weeks providing updated BIOS marked with CVE-2020-0543 so this does appear to be another issue that can be worked around in the Intel CPU microcode.
Intel also noted in today's disclosure, also noted in today's report that researchers behind CacheOut / L1D Eviction Sampling made a new discovery as "SGAxe" that relies upon this CVE-2020-0549 vulnerability in an unmitigated state.
More details when the various disclosure pages begin serving and I can dive deeper into this newest side-channel vulnerability and see if the mitigated microcode introduces any performance penalties.
UPDATE: Turns out Intel accidentally disclosed CrossTalk / SRBDS a few hours early against their own embargo... Here's what you need to know about CrossTalk / SRBDS.
This latest side-channel vulnerability was disclosed today as part of Intel's second Tuesday of the month reporting period along with several other security issues. INTEL-SA-00320 / CrossTalk is a Special Register Buffer Data Sampling "SRBDS" issue.
The whitepaper doesn't appear to be published yet by the independent researchers and the INTEL-SA-00320 deep dive page isn't yet working.
There have been motherboard vendors in recent weeks providing updated BIOS marked with CVE-2020-0543 so this does appear to be another issue that can be worked around in the Intel CPU microcode.
Intel also noted in today's disclosure, also noted in today's report that researchers behind CacheOut / L1D Eviction Sampling made a new discovery as "SGAxe" that relies upon this CVE-2020-0549 vulnerability in an unmitigated state.
INTEL-SA-00320 is a side-channel issue called Special Register Buffer Data Sampling, or SRBDS, with a medium CVSS score. As with all side-channel issues reported to date, Intel is not aware of any real-world exploits of SRBDS outside of a lab environment. We are aware that researchers have released a paper on this issue and refer to it as "CrossTalk".
More details when the various disclosure pages begin serving and I can dive deeper into this newest side-channel vulnerability and see if the mitigated microcode introduces any performance penalties.
UPDATE: Turns out Intel accidentally disclosed CrossTalk / SRBDS a few hours early against their own embargo... Here's what you need to know about CrossTalk / SRBDS.
35 Comments