Close Menu
World Forbes – Business, Tech, AI & Global Insights
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
What's Hot

Japan’s sushi legend in ‘Jiro Dreams of Sushi’ documentary turns 100

October 26, 2025

Louvre heist leaves a cultural wound — and may turn French Crown Jewels into legend

October 26, 2025

By the Numbers: Why trick-or-treaters may bag more gummy candy than chocolate this Halloween

October 25, 2025
Facebook X (Twitter) Instagram
Trending
  • Japan’s sushi legend in ‘Jiro Dreams of Sushi’ documentary turns 100
  • Louvre heist leaves a cultural wound — and may turn French Crown Jewels into legend
  • By the Numbers: Why trick-or-treaters may bag more gummy candy than chocolate this Halloween
  • Health providers turning to prescriptions to get people outside
  • Poker’s NBA-and-Mafia betting scandal echoes movies, popular culture
  • Book lovers and history buffs find solace in centuries-old athenaeums
  • Grandmothers in Colombia get the quinceañera they never had
  • Russia’s population is getting smaller and older. Putin sees it as a national security threat
World Forbes – Business, Tech, AI & Global InsightsWorld Forbes – Business, Tech, AI & Global Insights
Monday, October 27
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
World Forbes – Business, Tech, AI & Global Insights
Home » Chipmaker Patch Tuesday: Intel, AMD, Arm Respond to New CPU Attacks
Cybersecurity

Chipmaker Patch Tuesday: Intel, AMD, Arm Respond to New CPU Attacks

By adminMay 14, 2025No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email
Post Views: 203


Chip giants Intel, AMD and Arm each published Patch Tuesday security advisories to inform customers about vulnerabilities found recently in their products, including ones related to newly disclosed CPU attacks.

One of the CPU attacks was disclosed this week by researchers at Swiss university ETH Zurich. The researchers discovered a branch privilege injection issue, tracked as CVE-2024-45332, that they claim “brings back the full might of branch target injection attacks (Spectre-BTI) on Intel”.

The researchers claim that while Intel’s Spectre-BTI (aka Spectre v2) mitigations have worked for nearly six years, they have now found a way to break them due to a race condition impacting Intel CPUs. 

Spectre-style attacks could allow an attacker who has access to the targeted system to obtain potentially valuable information from memory, such as encryption keys and passwords.

In its advisory, Intel said it’s releasing microcode updates to mitigate CVE-2024-45332, which it described as a sensitive information disclosure issue. 

AMD has published an advisory to inform customers that — as stated by the researchers as well — the vulnerability does not impact its CPUs.

Another CPU attack was disclosed this week by researchers at Dutch university VU Amsterdam. Their analysis, dubbed Training Solo, led to the discovery of three new classes of self-training Spectre v2 attacks, which highlight the limitations of domain isolation.

The researchers developed two exploits against Intel CPUs that can leak kernel memory at up to 17 Kb/s, and they found two new hardware flaws (tracked as CVE-2024-28956 and CVE-2025-24495), which “completely break the domain isolation and re-enable traditional user-user, guest-guest, and even guest-host Spectre-v2 attacks”.

Advertisement. Scroll to continue reading.

Intel said it’s releasing microcode updates and prescriptive guidance to mitigate these vulnerabilities. 

AMD has published an advisory to say that its CPUs are not impacted by this attack. Arm CPUs, on the other hand, may be impacted. The chipmaker told customers that while this is not a new vulnerability, its security guidance has been updated to more explicitly highlight the risks.

Intel has published 25 new advisories covering dozens of vulnerabilities found across its products. 

The chip giant has patched high-severity vulnerabilities that can lead to information disclosure, DoS attacks or privilege escalation in Tiber Edge Platform, Graphics and Graphics Driver, Server Board, PROSet/Wireless, Gaudi, Xeon, Ethernet Network Adapter, Slim Bootloader, and Simics Package Manager products.

Medium-severity issues have been addressed in Intel’s RealSense, Ethernet Network Adapter, Ethernet Connections Boot Utility, oneAPI Level Zero, OpenVINO, Advisor, Endurance Gaming Mode, Arc GPU, Core and Xeon CPU, oneAPI DPC++/C++ Compiler, and QuickAssist Technology products. 

AMD has published three other new advisories. One covers four high-severity vulnerabilities in AMD Manageability Tools — their exploitation can lead to privilege escalation and potentially arbitrary code execution.

Another advisory describes two high-severity flaws in AMD Optimizing CPU Libraries (AOCL), which could also be exploited for privilege escalation and possibly code execution. The last advisory covers a medium-severity issue in uProf that can be exploited to delete arbitrary files. 

Related: Intel TDX Connect Bridges the CPU-GPU Security Gap

Related: AMD Patches CPU Vulnerability That Could Break Confidential Computing Protections

Related: New SLAP and FLOP CPU Attacks Expose Data From Apple Computers, Phones



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

O2 Service Vulnerability Exposed User Location

May 20, 2025

Madhu Gottumukkala Officially Announced as CISA Deputy Director

May 20, 2025

BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

May 19, 2025

Printer Company Procolored Served Infected Software for Months

May 19, 2025

UK Legal Aid Agency Finds Data Breach Following Cyberattack

May 19, 2025

480,000 Catholic Health Patients Impacted by Serviceaide Data Leak

May 19, 2025
Add A Comment
Leave A Reply

Don't Miss
Billionaires

OpenEvidence’s Daniel Nadler $1.3 Billion Richer In Just Three Months After The AI Startup Hits $6 Billion Valuation

October 20, 2025

OpenEvidence’s Daniel NadlerMauricio Candela for Forbes OpenEvidence, which Forbes profiled in July, has been signing…

Alex Bouaziz On Deel’s Latest Fundraise And Why He’s Not Worried About Litigation

October 20, 2025

Meet The Florida Sugar Barons Worth $4 Billion And Getting Sweet Deals From Donald Trump

October 17, 2025

Why Direct Lending Is Not In A Bubble

October 16, 2025
Our Picks

Japan’s sushi legend in ‘Jiro Dreams of Sushi’ documentary turns 100

October 26, 2025

Louvre heist leaves a cultural wound — and may turn French Crown Jewels into legend

October 26, 2025

By the Numbers: Why trick-or-treaters may bag more gummy candy than chocolate this Halloween

October 25, 2025

Health providers turning to prescriptions to get people outside

October 25, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to World-Forbes.com
At World-Forbes.com, we bring you the latest insights, trends, and analysis across various industries, empowering our readers with valuable knowledge. Our platform is dedicated to covering a wide range of topics, including sports, small business, business, technology, AI, cybersecurity, and lifestyle.

Our Picks

After Klarna, Zoom’s CEO also uses an AI avatar on quarterly call

May 23, 2025

Anthropic CEO claims AI models hallucinate less than humans

May 22, 2025

Anthropic’s latest flagship AI sure seems to love using the ‘cyclone’ emoji

May 22, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 world-forbes. Designed by world-forbes.

Type above and press Enter to search. Press Esc to cancel.