Intel has recently disclosed a new group of vulnerabilities collectively known as Microarchitectural Data Sampling (MDS) affecting some Intel processors. MDS may allow an attacker who can locally execute code on a system to infer and read protected data of another process running on the same system. Exploiting the vulnerabilities requires an attacker to run malicious programs on affected systems and analyse large amount of collected data.
A successful exploitation of the vulnerabilites could lead to information disclosure.
Keep systems, browsers and firmware up-to-date
Some product vendors as listed below have released patches and/or provided information on mitigating the risks posed by the MDS vulnerabilities. The list is not exhaustive and system administrators should consult product vendors to confirm whether the products are affected and if so, availability of patches and mitigation measures.
Keep anti-malware software and its signatures up-to-date
The vulnerability is exploitable only if malware is run on the affected systems. System administrators and users should regularly check and update the anti-malware software and its signatures to the latest version in order to mitigate the security risk of being exploited or infected.
Use only authorised software
Software downloaded from the Internet may contain malware. Users should obtain software from official sources.
https://www.intel.com/content/www/us/en/architecture-and-technology/mds.html
https://cpu.fail/
https://www.securityweek.com/intel-mds-vulnerabilities-what-you-need-know?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A%20Securityweek%20%28SecurityWeek%20RSS%20Feed%29&quicktabs_1=1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091