Reptar: New Intel CPU Vulnerability Affecting Alder Lake, Raptor Lake, and Sapphire Rapids

by | Nov 15, 2023 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

Intel has addressed a high-severity CPU vulnerability, dubbed as Reptar and tracked as CVE-2023-23583, impacting a range of its modern processors, including the latest Alder Lake, Raptor Lake, and Sapphire Rapids microarchitectures.

he flaw, described as a ‘Redundant Prefix Issue,’ could potentially allow attackers to escalate privileges, gain access to sensitive information, or induce a denial of service state, posing significant risks, especially for cloud providers.

The vulnerability arises under specific microarchitectural conditions when executing an instruction (REP MOVSB) encoded with a redundant REX prefix. In certain scenarios, this could lead to unpredictable system behavior, resulting in a system crash or hang. More critically, in limited instances, there’s a possibility of privilege escalation from CPL3 to CPL0.

Intel, while emphasizing that real-world non-malicious software is not expected to encounter this issue, recommends immediate mitigation measures. The company has already released updated microcodes for affected systems, including those with Alder Lake, Raptor Lake, and Sapphire Rapids, with no observed performance impact.

See Also: So you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

Google’s information security research teams, including those from Google Information Security Engineering and the silifuzz team, independently discovered this vulnerability, branding it as ‘Reptar.’ Tavis Ormandy from Google revealed that the bug triggers unusual behavior, such as branches to unexpected locations and processor malfunction when multiple cores are affected.




Users with affected processors are advised to update to the latest microcode promptly. Intel has provided a comprehensive list of affected CPUs and mitigation guidance. Beyond microcode updates, users are urged to update their BIOS, system OS, and drivers through their original equipment manufacturer (OEM), operating system vendor (OSV), and hypervisor vendors to ensure comprehensive protection against potential exploits.

Are u a security researcher? Or a company that writes articles or write ups about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing?

If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This