Spectre

Vulnerability updated 25 days ago (2024-08-14T09:30:24.541Z)
Download STIX
Preview STIX
Spectre, also known as Spectre-BHB or branch history injection (BHI), is a significant software vulnerability that was first exposed in 2018. This flaw in the design or implementation of CPU hardware utilizing speculative execution made computer memory an easy target for hackers. Attackers could exploit this vulnerability to inject malicious code and steal sensitive data, including usernames and passwords, by leveraging side-channel attacks such as timing attacks. The vulnerability proved to be a striking demonstration of the power of these types of attacks, despite not being a cryptographic attack in the traditional sense. The Spectre vulnerability has resurfaced with new hardware, AmpereOne, indicating its persistent threat to information security. A variant of the original Spectre v1 vulnerability, dubbed "GhostRace," exploits a race condition on a transiently executed path originating from a mis-speculated branch, similar to the original Spectre v1. This targets a racy code snippet or gadget that ultimately discloses information to the attacker. Any CPU hardware that uses speculative execution and is vulnerable to Spectre v1 is likely affected by this variant. The discovery of Spectre was initially reported to Intel in 2016 by Daniel Gruss, a researcher at Graz University of Technology, focusing on the prefetch side-channel at the center of Spectre. However, Intel did not immediately act on this report, which led to the widespread exposure of the vulnerability two years later. Gruss suggested that if Intel had taken their report more seriously and conducted thorough investigations on different machines, the Spectre vulnerability could have been identified and addressed much earlier.
Description last updated: 2024-08-14T09:00:07.601Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Vulnerability
Exploit
Hardware
Safari
Exploits
Encryption
Linux
Ransomware
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Vulnerabilities
To see the evidence that has resulted in these vulnerability associations, create a free account
IDTypeVotesProfile Description
iLeakageis related to
4
iLeakage is a notable software vulnerability that impacts Apple devices, specifically through the Safari web browser. This flaw in software design or implementation allows attackers to exploit Safari and illicitly acquire data from users' devices. The iLeakage attack technique has raised significant
meltdownis related to
4
Meltdown is a significant vulnerability, a flaw in software design or implementation, that was discovered in 2018. It exposed computer memory as an accessible target for hackers to inject malicious code and steal data, alongside its counterpart, Spectre. These vulnerabilities used side-channel attac
Spectre V2is related to
2
Spectre v2 is a software vulnerability that arises from an incorrect implementation of its simultaneous multithreading (SMT) mitigations, particularly in relation to calling prctl with PR_SET_SPECULATION_CTRL. This flaw in the software design or execution allows for potential exploitation by malicio
Source Document References
Information about the Spectre Vulnerability was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
DARKReading
a month ago
Memory Safety Is Key to Preventing Hardware Hacks
CERT-EU
6 months ago
CPU hardware utilizing speculative execution may be vulnerable to speculative race conditions
DARKReading
a month ago
Could Intel Have Fixed Spectre & Meltdown Bugs Earlier?
DARKReading
2 months ago
Intel CPUs Face Spectre-Like Attack That Leaks Data
Checkpoint
2 months ago
Modern Cryptographic Attacks: A Guide for the Perplexed - Check Point Research
DARKReading
4 months ago
Chip Giants Finalize Specs Baking Security into Silicon
DARKReading
5 months ago
Patchless Apple M-Chip Vulnerability Allows Cryptography Bypass
DARKReading
6 months ago
'GhostRace' Speculative Execution Attack Impacts All CPU, OS Vendors
CERT-EU
6 months ago
Not everything has to be a massive, global cyber attack
CERT-EU
6 months ago
GhostRace (CVE-2024-2193): Processor Flaws Enable Kernel Attacks
CERT-EU
6 months ago
IWD 2024: Defending against modern adversaries requires greater diversity
CERT-EU
6 months ago
Blockchain in Cybersecurity: Use Cases for Businesses
CERT-EU
6 months ago
Operationalizing NIST CSF 2.0; AI Models Run Amok | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
DARKReading
6 months ago
CISO Corner: Operationalizing NIST CSF 2.0; AI Models Run Amok
DARKReading
6 months ago
MITRE Rolls Out 4 Brand-New CWEs for Microprocessor Security Bugs
CERT-EU
6 months ago
UK consultancies cut numbers amid market slowdown
CERT-EU
7 months ago
Red Hat Enterprise Linux 8.6 Extended Update Support update for kernel
CISA
7 months ago
Siemens SCALANCE XCM-/XRM-300 | CISA
CERT-EU
8 months ago
MELTDOWN-AND-SPECTRE-ATTACKS | Security
CERT-EU
8 months ago
USN-3690-2 | Security