Four new vulnerabilities in Intel processors have been identified and can be used through side-channel attacks. The vulnerabilities are called RIDL, Fallout and ZombieLoad.
These vulnerabilities allow intruders to steal passwords, encryption keys, or any other type of data that is loaded or stored in the CPU buffer memory.
The vulnerabilities are categorized as Microarchitectural Data Sampling (MDS) and are identified by the following four CVEs:
- CVE-2018-12126 - Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12130 - Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12127 - Microarchitectural Load Port Data Sampling (MLPDS)
- CVE-2019-11091 - Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
The researchers who announced the vulnerabilities, in addition to baptizing them (sic), also created two different websites, from which you can read more:
You should be aware that all repair solutions currently available are only mitigations and do not completely fix vulnerabilities. To fully resolve these vulnerabilities, all vendors state that you should disable hyper-threading, which will affect your computer.
Official MDS Advisories, Patches, or Updates:
- Lenovo BIOS updates
- ADV190013 | Microsoft Guidance to Mitigate Microarchitectural Data Sampling vulnerabilities
- Windows guidance to protect against speculative execution side-channel vulnerabilities
Unfortunately no microcode updates are available for the following versions of Windows (and for Windows 10 version 1809, which will be released later):
- Windows 10 Version 1803 for x64-based Systems
- Windows Server, 1803 (Server Core Installation)
- Windows 10 Version 1809 for x64-based Systems
- Windows Server 2019
- Windows Server 2019 (Server Core Installation)