Reptar: New Intel CPU Vulnerability Impacts Multi-Tenant Virtualized Environments

Reptar: New Intel CPU Vulnerability Impacts Multi-Tenant Virtualized Environments

November 15, 2023 at 02:57AM

Intel has released fixes for a high-severity flaw called Reptar that affects its desktop, mobile, and server CPUs. The vulnerability, tracked as CVE-2023-23583, allows for privilege escalation, information disclosure, denial of service, and bypassing of security boundaries. Intel has published updated microcode for all affected processors and there is currently no evidence of active attacks using this vulnerability. AMD has also released patches for a security flaw called CacheWarp.

Key Takeaways from Meeting Notes:

1. Intel has released fixes for a high-severity flaw called Reptar that affects their desktop, mobile, and server CPUs.
2. The vulnerability, tracked as CVE-2023-23583, can potentially allow escalation of privilege, information disclosure, and denial of service through local access.
3. Successful exploitation of the vulnerability can bypass CPU security boundaries and cause the host machine to crash, affecting other guest machines in a multi-tenant virtualized environment.
4. The vulnerability could also lead to information disclosure or privilege escalation.
5. Security researcher Tavis Normandy found that Reptar can corrupt the system state and force a machine-check exception.
6. Intel has published updated microcode for all affected processors.
7. A complete list of Intel CPUs impacted by the vulnerability is available.
8. There is currently no evidence of active attacks using this vulnerability.
9. Intel believes that non-malicious real-world software is unlikely to encounter this issue, as malicious exploitation requires execution of arbitrary code.
10. AMD processors have also been affected by a security flaw called CacheWarp (CVE-2023-20592), which allows malicious actors to break into AMD SEV-protected virtual machines to escalate privileges and gain remote code execution.

Full Article