{"id":5141,"date":"2018-08-25T17:00:58","date_gmt":"2018-08-25T11:30:58","guid":{"rendered":"https:\/\/antivirus.comodo.com\/blog\/?p=5141"},"modified":"2020-08-18T20:58:59","modified_gmt":"2020-08-18T15:28:59","slug":"foreshadow-attacks-on-intel-chips","status":"publish","type":"post","link":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/foreshadow-attacks-on-intel-chips\/","title":{"rendered":"Foreshadow Attacks on Intel Chips is Causing Serious Vulnerabilities"},"content":{"rendered":"<div itemscope itemtype=\"http:\/\/schema.org\/ImageObject\">\n<meta itemprop=\"name\" content=\"Foreshadow attacks on Intel\"><br \/>\n<img decoding=\"async\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/08\/foreshadow-attacks.png\" class=\"img-responsive\" alt=\"Foreshadow attacks on Intel\" itemprop=\"contentUrl\"\/><br \/>\n<meta itemprop=\"datePublished\" content=\"2018-08-22\"><br \/>\n<meta itemprop=\"description\" content=\"Foreshadow Attacks took place on Intel chips similar to specter meltdown and is causing serious vulnerabilities\">\n<\/div>\n<p>Intel&#8217;s Software Guard Extensions (SGX) feature allows programs to establish secure enclaves on Intel processors. The secure enclave develops a safe haven for sensitive information, even if malware or another malady compromises the main computer. A global research group comprising of researchers from five academic institutions discovered that even though SGX can mostly repel Spectre and Meltdown attacks, a related attack can actually bypass its defenses. This is called Foreshadow.<\/p>\n<p>Foreshadow attacks, according to the researchers, is a risky attack on Intel processors, which permits an attacker to steal confidential information stored inside personal computers or third-party clouds. Foreshadow is available in two versions:<\/p>\n<p>The original attack designed for extracting data from Software Guard Extensions (SGX) enclaves<br \/>\nA Next-Generation version which affects hypervisors (VMM), operating system (OS) kernel memory, System Management Mode (SMM) memory, and Virtual Machines (Vms).<\/p>\n<p>The vulnerabilities allow reading the data from an area of fast memory called the L1 cache, which is available to each processor core. An attacker can actually use the exploits to read any data held in the cache, including the operating system&#8217;s kernel, protected data belonging to the System Management Mode (SMM), or to other virtual machines (VMs) working on third-party clouds.<\/p>\n<p>From a theoretical viewpoint, it could be possible to use the exploits for stealing information from virtual machines running on private or public clouds, as they allow a malicious VM running on the cloud to read memory that belongs to the VM&#8217;s hypervisor or memory that belongs to another guest VM. However, the VMs will have to be running on the same processor core for an attack to be successful.<\/p>\n<p>The three related Foreshadow attacks include:<\/p>\n<ul>\n<li>CVE-2018-3615 (for SGX)<\/li>\n<li>CVE-2018-3620 (for operating systems and SMM)<\/li>\n<li>CVE-2018-3646 (for virtualization)<\/li>\n<\/ul>\n<p>The exploits have also been used for compromising the protections offered by SGX. While SGX can store data and applications within a secure section of memory, an &#8220;enclave&#8221; protected from inspection or modification, Foreshadow attacks, on the other hand, can be used for extracting the attestation keys used for verifying the identity of a secure SGX enclave, permitting an attacker to trick the system into designating an insecure portion of memory as being secured by SGX. Such attacks can be prevented by installing a reliable <a href=\"https:\/\/www.comodo.com\/home\/internet-security\/antivirus.php\" target=\"_blank\">antivirus software<\/a> that would execute efficient <a href=\"https:\/\/antivirus.comodo.com\/virus-protection.php\" target=\"_blank\">virus protection<\/a> measures and thus safeguard all sensitive data.<\/p>\n<p>The Foreshadow researchers place emphasis on the challenges and limitations of actually executing the attack in the wild. They state that easy, cheap, and effective techniques like malware distribution and phishing are still the most cost-effective and obvious choice for targeting individuals. Compared to those, Foreshadow would indeed be impractical. Additionally, SGX is a specialized feature not used by most individuals.<\/p>\n<p>The findings indeed still speak to longstanding concerns and questions about reliance on SGX\u2014and whether for all its benefits it also has the downside of turning into a single point of failure for everyone&#8217;s most sensitive data and software.<\/p>\n<p>Despite the fact that not all users rely on SGX, an increasing number of secure services are exploring the possibility of using it in their consumer products. On the whole, Intel will have to patch things thoroughly and quickly as the company has now studied that many more processor systems are susceptible to Foreshadow-type attacks than just SGX. Intel and the Foreshadow researchers suggest that enterprises and individuals will have to regularly update their devices and also be aware of the fact that leading cloud companies are already working on mitigating Foreshadow. There seems to be a continuous growth of chip architecture in order to head off future speculative execution flaws. Intel states that the ongoing developments in its pipeline will be launched into the market at the end of the year. However, for now, there seems to be a spread in new, nasty attacks and hence Foreshadow attacks may just be a dramatic name, but in this case, it is also apt.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/download\/thank-you.php?prod=cloud-antivirus&#038;track=16678&#038;af=16678\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/04\/Comodo-Free-Antivirus.png\" alt=\"comodo antivirus\"\/><\/a><\/p>\n<p><a href=\"https:\/\/secure.nurd.com\/home\/purchase.php?pid=109&#038;af=16166\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2020\/08\/complete-antivirus.png\" alt=\"comodo antivirus\" width=\"650\" height=\"83\" \/><\/a><\/p>\n<p><strong>Related Resources<\/strong><br \/>\n<a href=\"https:\/\/enterprise.comodo.com\/blog\/what-is-virus-removal\/\" target=\"blank\">Virus Protection<\/a><\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/best-antivirus-of-2019\/\" target=\"blank\">Best Antivirus<\/a><\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/antivirus-for-android.php\" target=\"blank\">Antivirus for Android<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Intel&#8217;s Software Guard Extensions (SGX) feature allows programs to establish secure enclaves on Intel processors. The secure enclave develops a safe haven for sensitive information, even if malware or another malady compromises the main computer. A global research group comprising of researchers from five academic institutions discovered that even though SGX can mostly repel Spectre [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":5091,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[199,224],"class_list":["post-5141","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-comodo-news","tag-malware-attacks","tag-spectre"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Foreshadow Attacks on Intel Chips | Serious Vulnerabilities Caused<\/title>\n<meta name=\"description\" content=\"Foreshadow Attacks on Intel Chips is causing serious vulnerabilities and is similar to specter meltdown attacks which steals confidential data of users.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/foreshadow-attacks-on-intel-chips\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Foreshadow Attacks on Intel Chips | Serious Vulnerabilities Caused\" \/>\n<meta property=\"og:description\" content=\"Foreshadow Attacks on Intel Chips is causing serious vulnerabilities and is similar to specter meltdown attacks which steals confidential data of users.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/foreshadow-attacks-on-intel-chips\/\" \/>\n<meta property=\"og:site_name\" content=\"Comodo Antivirus Blogs | Anti-Virus Software Updates\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-25T11:30:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-08-18T15:28:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/08\/foreshadow-pc-attacks.png\" \/>\n\t<meta property=\"og:image:width\" content=\"225\" \/>\n\t<meta property=\"og:image:height\" content=\"170\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"seo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"seo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/foreshadow-attacks-on-intel-chips\/\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/foreshadow-attacks-on-intel-chips\/\",\"name\":\"Foreshadow Attacks on Intel Chips | Serious Vulnerabilities Caused\",\"isPartOf\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/foreshadow-attacks-on-intel-chips\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/foreshadow-attacks-on-intel-chips\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/08\/foreshadow-pc-attacks.png\",\"datePublished\":\"2018-08-25T11:30:58+00:00\",\"dateModified\":\"2020-08-18T15:28:59+00:00\",\"author\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\"},\"description\":\"Foreshadow Attacks on Intel Chips is causing serious vulnerabilities and is similar to specter meltdown attacks which steals confidential data of users.\",\"breadcrumb\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/foreshadow-attacks-on-intel-chips\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/foreshadow-attacks-on-intel-chips\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/foreshadow-attacks-on-intel-chips\/#primaryimage\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/08\/foreshadow-pc-attacks.png\",\"contentUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/08\/foreshadow-pc-attacks.png\",\"width\":225,\"height\":170,\"caption\":\"Best Free Malware Protection\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/foreshadow-attacks-on-intel-chips\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/antivirus.comodo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Foreshadow Attacks on Intel Chips is Causing Serious Vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/\",\"name\":\"Comodo Antivirus Blogs | Anti-Virus Software Updates\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\",\"name\":\"seo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"caption\":\"seo\"},\"url\":\"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Foreshadow Attacks on Intel Chips | Serious Vulnerabilities Caused","description":"Foreshadow Attacks on Intel Chips is causing serious vulnerabilities and is similar to specter meltdown attacks which steals confidential data of users.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/foreshadow-attacks-on-intel-chips\/","og_locale":"en_US","og_type":"article","og_title":"Foreshadow Attacks on Intel Chips | Serious Vulnerabilities Caused","og_description":"Foreshadow Attacks on Intel Chips is causing serious vulnerabilities and is similar to specter meltdown attacks which steals confidential data of users.","og_url":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/foreshadow-attacks-on-intel-chips\/","og_site_name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","article_published_time":"2018-08-25T11:30:58+00:00","article_modified_time":"2020-08-18T15:28:59+00:00","og_image":[{"width":225,"height":170,"url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/08\/foreshadow-pc-attacks.png","type":"image\/png"}],"author":"seo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"seo","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/foreshadow-attacks-on-intel-chips\/","url":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/foreshadow-attacks-on-intel-chips\/","name":"Foreshadow Attacks on Intel Chips | Serious Vulnerabilities Caused","isPartOf":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/foreshadow-attacks-on-intel-chips\/#primaryimage"},"image":{"@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/foreshadow-attacks-on-intel-chips\/#primaryimage"},"thumbnailUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/08\/foreshadow-pc-attacks.png","datePublished":"2018-08-25T11:30:58+00:00","dateModified":"2020-08-18T15:28:59+00:00","author":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462"},"description":"Foreshadow Attacks on Intel Chips is causing serious vulnerabilities and is similar to specter meltdown attacks which steals confidential data of users.","breadcrumb":{"@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/foreshadow-attacks-on-intel-chips\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/antivirus.comodo.com\/blog\/comodo-news\/foreshadow-attacks-on-intel-chips\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/foreshadow-attacks-on-intel-chips\/#primaryimage","url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/08\/foreshadow-pc-attacks.png","contentUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/08\/foreshadow-pc-attacks.png","width":225,"height":170,"caption":"Best Free Malware Protection"},{"@type":"BreadcrumbList","@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/foreshadow-attacks-on-intel-chips\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/antivirus.comodo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Foreshadow Attacks on Intel Chips is Causing Serious Vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/antivirus.comodo.com\/blog\/#website","url":"https:\/\/antivirus.comodo.com\/blog\/","name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462","name":"seo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","caption":"seo"},"url":"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/5141","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/comments?post=5141"}],"version-history":[{"count":14,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/5141\/revisions"}],"predecessor-version":[{"id":14886,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/5141\/revisions\/14886"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media\/5091"}],"wp:attachment":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media?parent=5141"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/categories?post=5141"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/tags?post=5141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}