Affiliate Disclosure
If you buy through our links, we may get a commission. Read our ethics policy.

'Foreshadow' Intel processor attack bypasses protections for secure data held on chip

A new vulnerability called "Foreshadow" affecting Intel processors has been revealed by researchers to bypass the company's built-in security on the chip, an attack which has the potential to acquire sensitive data stored on supposedly secure cordoned-off areas on the processor.

Foreshadow attacks a feature on Intel processors called Secure Guard Extensions (SGX), which are meant to help protect a user's data held in the processor, even if the entire computer was controlled by an attacker, reports Wired. In effect, SGX creates a secure section of memory on the chip designed for holding sensitive data, one that cannot be directly read by malicious code.

While SGX was previously thought to be able to fend off speculative execution attacks, such as those stemming from Meltdown and Spectre, the Foreshadow vulnerability uses a similar technique but can gain access to the SGX-protected L1 memory. Foreshadow is even capable of extracting the target's private attestation key, a cryptographic key used for SGX integrity checks.

As SGX's built-in privacy protection makes it difficult to know who signed the enclave, knowing the attestation key can allow for the creation of SGX signatures that could appear to be genuine, but isn't. As the attestation key is compromised, this means multiple machines in the same ecosystem could be compromised at the same time, rather than just one.

Speculative execution attacks rely on a processor's guess of what operation it will be asked to perform, and its preparation. This is done to save resources, but at the same time produces information that could be useful for an attacker to insert their own instructions, and in turn gain control of the system.

Two similar variants have also been discovered, named Foreshadow-NG, which also attacks SMM code, operating systems, hypervisor software, and other microprocessors. According to the researchers, this could impact virtual machines on cloud services, including the use of a malicious guest VM reading the memory of the hypervisor or even memory belonging to another VM.

Researchers from KU Leuven initially discovered the vulnerability, independently from research into Meltdown and Spectre, with the team notifying Intel on January 3, 2018. Other researchers from Technion, the University of Michigan, the University of Adelaide, and CSIRO's Data61 also found the issue separately, alerting Intel to their research on January 23.

The researchers advise the Foreshadow attacks can be performed against all Skylake and Kaby Lake processors, due to the chip families all using SGX. There are few traces in logs following an attack, which can also be launched in "user space," namely that an attacker does not require deep system access to perform it.

While potentially hazardous, the research teams also note that most users are unlikely to be hit by Foreshadow, due to the challenges of performing the attack, and the relatively limited number of desktops running SGX-enabled processors in the first place. Other routes of attack, including distributing malware and phishing attempts, are still more likely to be favored by attackers compared to the new discovery.

Intel has advised it will be providing mitigations to combat Foreshadow, addressing both software and microcode problems. Distribution for what Intel calls the "L1 Terminal Fault" commenced in May, with the chip maker also co-ordinating with major tech firms to distribute relevant patches.

It is highly likely that Apple will be involved in the patching process, if it hasn't already, as it uses Intel processors across its entire Mac and MacBook product lines. Current-generation iMac models use Skylake processors, and while earlier MacBook Pro models used Skylake and Kaby Lake chips, the latest use Coffee Lake.



14 Comments

mcdave 19 Years · 1927 comments

Time to move on from Intel.

A new ARM MacBook makes sense, it doesn’t need the x86-64 performance an MBP does and I’m pretty sure 3rd party software use is fairly minimal on these machines.  Emulating macOS/Windows x86 should be at Intel Y levels by now.  Maybe license AMD64 for the job.

I just wish they’d hurry up & show some point of difference rather than cost.

jeffreytgilbert 14 Years · 368 comments

mcdave said:
Time to move on from Intel.

A new ARM MacBook makes sense, it doesn’t need the x86-64 performance an MBP does and I’m pretty sure 3rd party software use is fairly minimal on these machines.  Emulating macOS/Windows x86 should be at Intel Y levels by now.  Maybe license AMD64 for the job.

I just wish they’d hurry up & show some point of difference rather than cost.

It bums me out when I see brand fans making statements like this. AMD wasn't immune to timing attacks. This whole area of security research at the chip level is novel. It's not like suddenly you move to ARM and then you're perfectly safe from unforeseen flaws in chip designs. You're gonna learn as you go as researchers get more and more clever at finding ways to attack them.

GG1 7 Years · 483 comments

How do these researchers (and hackers) understand enough of the low-level chip details, such as SGX, to attempt these exploits? Are there enough low-level architectural details in the Intel developer specs?
Then if Apple do not reveal similar specs on their A-series chips, such as Secure Enclave, etc., wouldn't that make the A-series more immune to these attacks by virtue of no documentation?

Rayz2016 8 Years · 6957 comments

GG1 said:
How do these researchers (and hackers) understand enough of the low-level chip details, such as SGX, to attempt these exploits? Are there enough low-level architectural details in the Intel developer specs?

Then if Apple do not reveal similar specs on their A-series chips, such as Secure Enclave, etc., wouldn't that make the A-series more immune to these attacks by virtue of no documentation?

No, I don’t think so, but this is just my opinion. 

I think Linux has benefitted from being open. I think having access to the internals gives people the opportunity to hack away at it and find bugs. 

Linux is  open, and it seems very secure. 

GG1 7 Years · 483 comments

Rayz2016 said:
GG1 said:
How do these researchers (and hackers) understand enough of the low-level chip details, such as SGX, to attempt these exploits? Are there enough low-level architectural details in the Intel developer specs?

Then if Apple do not reveal similar specs on their A-series chips, such as Secure Enclave, etc., wouldn't that make the A-series more immune to these attacks by virtue of no documentation?
No, I don’t think so, but this is just my opinion. 

I think Linux has benefitted from being open. I think having access to the internals gives people the opportunity to hack away at it and find bugs. 

Linux is  open, and it seems very secure. 

My very limited understanding is that Meltdown/Spectre are dependent upon the chip hardware architecture (pipelines/memory caches, ...) and not so much due to Windows. You're saying it isn't as cut-and-dried as that? I thought Meltdown/Spectre also affected Linux.