Article Details
Scrape Timestamp (UTC): 2024-04-10 09:46:07.628
Source: https://thehackernews.com/2024/04/researchers-uncover-first-native.html
Original Article Text
Click to Toggle View
Researchers Uncover First Native Spectre v2 Exploit Against Linux Kernel. Cybersecurity researchers have disclosed what they say is the "first native Spectre v2 exploit" against the Linux kernel on Intel systems that could be exploited to read sensitive data from the memory. The exploit, called Native Branch History Injection (BHI), can be used to leak arbitrary kernel memory at 3.5 kB/sec by bypassing existing Spectre v2/BHI mitigations, researchers from Systems and Network Security Group (VUSec) at Vrije Universiteit Amsterdam said in a new study. The shortcoming is being tracked as CVE-2024-2201. BHI was first disclosed by VUSec in March 2022, describing it as a technique that can get around Spectre v2 protections in modern processors from Intel, AMD, and Arm. While the attack leveraged extended Berkeley Packet Filters (eBPFs), Intel's recommendations to address the problem, among other things, were to disable Linux's unprivileged eBPFs. "Privileged managed runtimes that can be configured to allow an unprivileged user to generate and execute code in a privileged domain -- such as Linux's 'unprivileged eBPF' -- significantly increase the risk of transient execution attacks, even when defenses against intra-mode [Branch Target Injection] are present," Intel said at the time. "The kernel can be configured to deny access to unprivileged eBPF by default, while still allowing administrators to enable it at runtime where needed." Native BHI neutralizes this countermeasure by showing that BHI is possible without eBPF. It impacts all Intel systems that are susceptible to BHI. As a result, it makes it feasible for an attacker with access to CPU resources to influence speculative execution paths via malicious software installed on a machine with the goal of extracting sensitive data that are associated with a different process. "Existing mitigation techniques of disabling privileged eBPF and enabling (Fine)IBT are insufficient in stopping BHI exploitation against the kernel/hypervisor," the CERT Coordination Center (CERT/CC) said in an advisory. This is accomplished by means of a program called InSpectre Gadget, which can find gadgets within the operating system kernel that can be abused to get around safeguards baked into Intel microprocessors (e.g., FineIBT) to prevent speculative execution exploitation and obtain secret data. Gadgets refer to code fragments (i.e., sequence of instructions) whose speculative execution will transfer the victim's sensitive information into a covert channel. "An unauthenticated attacker can exploit this vulnerability to leak privileged memory from the CPU by speculatively jumping to a chosen gadget." The flaw has been confirmed to affect Illumos, Intel, Red Hat, SUSE Linux, Triton Data Center, and Xen. AMD, in a bulletin, said it's "not aware of any impact" on its products. The disclosure comes weeks after IBM and VUSec detailed GhostRace (CVE-2024-2193), a variant of Spectre v1 that employs a combination of speculative execution and race conditions to leak data from contemporary CPU architectures. It also follows new research from ETH Zurich that disclosed a family of attacks dubbed Ahoi Attacks that could be used to compromise hardware-based trusted execution environments (TEEs) and break confidential virtual machines (CVMs) like AMD Secure Encrypted Virtualization-Secure Nested Paging (SEV-SNP) and Intel Trust Domain Extensions (TDX). The attacks, codenamed Heckler and WeSee, make use of malicious interrupts to break the integrity of CVMs, potentially allowing threat actors to remotely log in and gain elevated access, as well as perform arbitrary read, write, and code injection to disable firewall rules and open a root shell. "For Ahoi Attacks, an attacker can use the hypervisor to inject malicious interrupts to the victim's vCPUs and trick it into executing the interrupt handlers," the researchers said. "These interrupt handlers can have global effects (e.g., changing the register state in the application) that an attacker can trigger to compromise the victim's CVM." In response to the findings, AMD said the vulnerability is rooted in the Linux kernel implementation of SEV-SNP and that fixes addressing some of the issues have been upstreamed to the main Linux kernel. Goodbye, Atlassian Server. Goodbye… Backups? Protect your data on Atlassian Cloud from disaster with Rewind's daily backups and on-demand restores. How to Update and Automate Outdated Security Processes Download the eBook for step-by-step guidance on how to update your security processes as your business grows.
Daily Brief Summary
Researchers from VUSec at Vrije Universiteit Amsterdam have revealed a new Spectre v2 exploit targeting the Linux kernel on Intel systems, capable of reading sensitive data from memory.
The exploit, termed Native Branch History Injection (BHI), effectively bypasses existing mitigations and allows leakage of kernel memory at a rate of 3.5 kB/sec.
Unlike previous techniques, Native BHI does not rely on unprivileged eBPF, showing that it can circumvent countermeasures that involve disabling unprivileged eBPF.
The flaw, identified as CVE-2024-2201, impacts all Intel systems vulnerable to BHI, enabling attackers to manipulate speculative execution paths to extract data.
CERT/CC issued an advisory stating that conventional mitigation strategies like disabling privileged eBPF and enabling (Fine)IBT are insufficient in preventing exploitation.
The vulnerability was confirmed to affect multiple platforms including Illumos, Intel, Red Hat, SUSE Linux, Triton Data Center, and Xen, while AMD reported no impact on its products.
These findings follow other significant disclosures, including the GhostRace and Ahoi Attacks, which similarly exploit speculative execution vulnerabilities to compromise security.