Encryption-breaking, password-leaking bug in many AMD CPUs could take months to fix

pe1uca@lemmy.pe1uca.dev to Technology@beehaw.org – 140 points –
Encryption-breaking, password-leaking bug in many AMD CPUs could take months to fix
arstechnica.com

The bug allows attackers to swipe data from a CPU’s registers. […] the exploit doesn’t require physical hardware access and can be triggered by loading JavaScript on a malicious website.

19

You are viewing a single comment

The JavaScript vector is a reasonable extrapolation based on how similar attacks like Meltdown, Spectre, or Heartbleed, eventually got their JavaScript exploits. There may not be one yet, but there's likely to be one at some point.

It is still up in the air whether regular people with home computers need to be panicking.

That one's easy: no, they don't.

Even if an attacker were to get the disk encryption key from a regular user through some malicious JavaScript, the chances of them being able to actually exploit it, are slim to none. They'd still need some extra way to use that key, which would require a separate exploit, or physical access.

If it were a company computer, or the user got personally targeted (espionage, trade secrets, law enforcement, etc.)... then maybe worry a bit.

Hosting providers with shared servers, need to panic a lot. Anyone running a public server, be it at a provider or at home, should also panic a bit.

3 more...