Bug 2097184 (CVE-2022-24436, Hertzbleed, INTEL-SA-00698) - CVE-2022-24436 hw: cpu: cryptographic leaks via frequency scaling attacks(Intel)
Summary: CVE-2022-24436 hw: cpu: cryptographic leaks via frequency scaling attacks(In...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2022-24436, Hertzbleed, INTEL-SA-00698
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2097248 2097249 2097250 2097251 2097253 2097254 2097290
Blocks: 2097185
TreeView+ depends on / blocked
 
Reported: 2022-06-15 05:23 UTC by Sandipan Roy
Modified: 2022-09-23 12:33 UTC (History)
38 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A potential vulnerability in some Intel® processors using frequency scaling may allow an authenticated attacker to execute a timing attack to potentially enable information disclosure.
Clone Of:
Environment:
Last Closed: 2022-06-15 19:54:49 UTC
Embargoed:


Attachments (Terms of Use)

Description Sandipan Roy 2022-06-15 05:23:07 UTC
https://www.hertzbleed.com/

Hertzbleed is a new family of side-channel attacks: frequency side channels. In the worst case, these attacks can allow an attacker to extract cryptographic keys from remote servers that were previously believed to be secure.

Hertzbleed takes advantage of our experiments showing that, under certain circumstances, the dynamic frequency scaling of modern x86 processors depends on the data being processed. This means that, on modern processors, the same program can run at a different CPU frequency (and therefore take a different wall time) when computing, for example, 2022 + 23823 compared to 2022 + 24436.

Hertzbleed is a real, and practical, threat to the security of cryptographic software. We have demonstrated how a clever attacker can use a novel chosen-ciphertext attack against SIKE to perform full key extraction via remote timing, despite SIKE being implemented as “constant time”.
Research Paper

Intel’s security advisory states that all Intel processors are affected. We experimentally confirmed that several Intel processors are affected, including desktop and laptop models from the 8th to the 11th generation Core microarchitecture.

Yes, for full reproducibility. You can find the source code of all the experiments from our paper at the link: https://github.com/FPSG-UIUC/hertzbleed

Comment 6 Product Security DevOps Team 2022-06-15 19:54:45 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-24436


Note You need to log in before you can comment on or make changes to this bug.