New Intel CPU Vulnerabilities Uncovered: Memory Leaks and Spectre v2 Exploits Persist

May 16, 2025
Hardware Security / Vulnerability

Researchers at ETH Zürich have identified a critical new security flaw that affects all modern Intel CPUs, allowing the leakage of sensitive data from memory. This latest vulnerability, dubbed Branch Privilege Injection (BPI), showcases that the Spectre threat continues to impact computer systems over seven years after its initial discovery. According to ETH Zürich, BPI can be exploited to manipulate the CPU’s prediction calculations, granting unauthorized access to information from other users on the same processor. Kaveh Razavi, head of the Computer Security Group (COMSEC) and a co-author of the study, noted that this flaw affects all Intel processors, potentially allowing malicious actors to access the cache contents and working memory of different users sharing the CPU. The attack exploits Branch Predictor Race Conditions (BPRC), which arise when a processor alternates between prediction calculations for multiple users.

New Vulnerabilities in Intel CPUs Expose Risks of Memory Leaks and Spectre Attacks

May 16, 2025

In a significant development for cybersecurity, researchers from ETH Zürich have identified a critical security flaw affecting all modern Intel processors. This vulnerability, dubbed Branch Privilege Injection (BPI), can lead to unauthorized access to sensitive data stored in memory, amplifying concerns around the long-standing Spectre vulnerabilities that have troubled computer systems for over seven years.

BPI exploits the predictive calculations performed by the Central Processing Unit (CPU), allowing malicious actors to manipulate these processes to extract data from the memory spaces of other users sharing the same processor. Kaveh Razavi, the head of the Computer Security Group (COMSEC) at ETH Zürich and a co-author of the study, emphasized the vulnerability’s broad implications, as it potentially permits attackers to access cached data and operational memory belonging to different users on the affected CPU.

The attack hinges on exploiting Branch Predictor Race Conditions (BPRC), which occur during the CPU’s transition between predictive calculations. This presents a unique avenue for attackers to bypass traditional security measures and gain ephemeral access to confidential information. The ramifications of this flaw could extend far beyond theoretical vulnerabilities, posing a tangible risk to businesses relying on Intel processors in their infrastructure.

As companies increasingly integrate Intel hardware into their systems, the discovery underscores the necessity for vigilant cybersecurity practices. The ongoing issues related to Spectre vulnerabilities demonstrate that attackers continue to develop sophisticated methods to exploit fundamental architecture choices in modern CPUs.

This vulnerability primarily targets any business utilizing affected Intel processors, which are widespread across various industries, making the impact potentially far-reaching. In terms of cybersecurity frameworks, the tactics that could align with this attack scenario may include initial access through user-side vulnerabilities and privilege escalation mechanisms, revealing the layered complexity of modern cyber threats.

While the scale of potential exploitation remains to be fully understood, the emergence of BPI warrants immediate attention from business owners and IT departments. Organizations are urged to evaluate their cybersecurity posture and investigate potential mitigations against such memory leak vulnerabilities.

As the landscape of cyber threats evolves, this incident serves as a crucial reminder of the persistent risks posed by hardware vulnerabilities and the importance of robust security measures in safeguarding sensitive information.

Source link