By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: New T-Head CPU Bugs Expose Devices to Unrestricted Attacks
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > New T-Head CPU Bugs Expose Devices to Unrestricted Attacks
Tech News

New T-Head CPU Bugs Expose Devices to Unrestricted Attacks

By Viral Trending Content 5 Min Read
Share
SHARE

Aug 13, 2024Ravie LakshmananVulnerability / Hardware Security

CPU Bugs

A team of researchers from the CISPA Helmholtz Center for Information Security in Germany has disclosed an architectural bug impacting Chinese chip company T-Head’s XuanTie C910 and C920 RISC-V CPUs that could allow attackers to gain unrestricted access to susceptible devices.

The vulnerability has been codenamed GhostWrite. It has been described as a direct CPU bug embedded in the hardware, as opposed to a side-channel or transient execution attack.

“This vulnerability allows unprivileged attackers, even those with limited access, to read and write any part of the computer’s memory and to control peripheral devices like network cards,” the researchers said. “GhostWrite renders the CPU’s security features ineffective and cannot be fixed without disabling around half of the CPU’s functionality.”

CISPA found that the CPU has faulty instructions in its vector extension, an add-on to the RISC-V ISA designed to handle larger data values than the base Instruction Set Architecture (ISA).

These faulty instructions, which the researchers said operate directly on physical memory rather than virtual memory, could bypass the process isolation normally enforced by the operating system and hardware.

Cybersecurity

As a result, an unprivileged attacker could weaponize this loophole to write to any memory location and sidestep security and isolation features to obtain full, unrestricted access to the device. It could be also be leak any memory content from a machine, including passwords.

“The attack is 100% reliable, deterministic, and takes only microseconds to execute,” the researchers said. “Even security measures like Docker containerization or sandboxing cannot stop this attack. Additionally, the attacker can hijack hardware devices that use memory-mapped input/output (MMIO), allowing them to send any commands to these devices.”

The most effective countermeasure for GhostWrite is to disable the entire vector functionality, which, however, severely impacts the CPU’s performance and capabilities as it turns off roughly 50% of the instruction set.

“Luckily, the vulnerable instructions lie in the vector extension, which can be disabled by the operating system,” the researchers noted. “This fully mitigates GhostWrite, but also fully disables vector instructions on the CPU.”

“Disabling the vector extension significantly reduces the CPU’s performance, especially for tasks that benefit from parallel processing and handling large data sets. Applications relying heavily on these features may experience slower performance or reduced functionality.”

The disclosure comes as the Android Red Team at Google revealed more than nine flaws in Qualcomm’s Adreno GPU that could permit an attacker with local access to a device to achieve privilege escalation and code execution at the kernel level. The weaknesses have since been patched by the chipset maker.

It also follows the discovery of a new security flaw in AMD processors that could be potentially exploited by an attacker with kernel (aka Ring-0) access to elevate privileges and modify the configuration of System Management Mode (SMM or Ring-2) even when SMM Lock is enabled.

Cybersecurity

Dubbed Sinkclose by IOActive (aka CVE-2023-31315, CVSS score: 7.5), the vulnerability is said to have remained undetected for nearly two decades. Access to the highest privilege levels on a computer means it allows for disabling security features and installing persistent malware that can go virtually under the radar.

Speaking to WIRED, the company said the only way to remediate an infection would be to physically connect to the CPUs using a hardware-based tool known as SPI Flash programmer and scan the memory for malware installed using SinkClose.

“Improper validation in a model specific register (MSR) could allow a malicious program with ring0 access to modify SMM configuration while SMI lock is enabled, potentially leading to arbitrary code execution,” AMD noted in an advisory, stating it intends to release updates to Original Equipment Manufacturers (OEM) to mitigate the issue.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

OnePlus 15 is Wake-up Call that Apple & Samsung Should Not Ignore

A Collision With Space Debris Leaves 3 Chinese Astronauts Stranded in Orbit

DoorDash email spoofing vulnerability sparks messy disclosure dispute

Keychain announcing new funding from top UK retailers and launches AI OS for retailers

Google SIMA 2 AI Self-Improvement AI, AGI Progress & Questions

TAGGED: attack vector, Cyber Security, Cybersecurity, hardware security, Information security, Internet, Technology
Share This Article
Facebook Twitter Copy Link
Previous Article Kamala Harris’ campaign fills out state staff to “help deliver Colorado once again” for Democrats
Next Article Bit-Chess Announced Its Presale for Decentralized Chess to Take the Center Stage
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Meghan Trainor Then & Now: Photos of the Singer’s Transformation
Celebrity
Indie games just made history at The Game Awards 2025
Gaming News
Resident Evil Requiem Demo Isn’t Currently Planned: “We Just Want to Finish The Game”
Gaming News
Aave introduces mobile savings app with 9% interest and insurance protection
Crypto
Is Saylor’s Bitcoin Strategy A ‘Fraud’? Schiff Wants A Live Debate To Prove It
Crypto
Workers turn to ‘polyworking’ to combat frozen salaries and inflation
Business
OnePlus 15 is Wake-up Call that Apple & Samsung Should Not Ignore
Tech News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Meghan Trainor Then & Now: Photos of the Singer’s Transformation

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Meghan Trainor Then & Now: Photos of the Singer’s Transformation
November 17, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?