Chips from Intel and AMD, as well as processors from other manufacturers, may be susceptible to a new type of attack which could allow threat actors to steal cryptographic keys and other data directly from the endpoint’s (opens in new tab) hardware.
A team of security researchers, including Riccardo Paccagnella of the University of Illinois Urbana-Champaign, set out to investigate the idea of extracting cryptographic data from a chip by measuring the power consumed during data processing. It’s a relatively old theory that’s been proven inviable in practice, due to the inability to measure power consumption remotely.
But the researchers managed to give the idea a new twist, by turning the attack into a different type of side-channel exploit, and this one is a lot more viable.
Intel plays down the flaw
As it turns out, through dynamic voltage and frequency scaling (DVFS), attackers can track the time the server takes to respond to specific queries, effectively allowing them to spot changes in power consumption. It’s a relatively simple thing, researchers said. They’ve dubbed the vulnerability Hertzbleed, and it’s since being tracked as CVE-2022-24436 for Intel devices, and CVE-2022-23823 for AMD.
While they managed to successfully reproduce the attack on Intel chips from 8th to 11th generation, they’re also saying it works on Xeon, as well as Ryzen chips.
But Intel is having none of it. Responding to the findings, the company’s Senior Director of Security Communications and Incident Response Jerry Bryant, wrote that the idea is not practical outside the lab.
“While this issue is interesting from a research perspective, we do not believe this attack to be practical outside of a lab environment. Also note that cryptographic implementations that are hardened against power side-channel attacks are not vulnerable to this issue.”
The chip manufacturers won’t be updating their chips, Ars Technica found, and will instead endorse changes Microsoft and Cloudflare made to their PQCrypto-SIDH and CIRCL cryptographic code libraries.