New Intel CPU Vulnerabilities Uncovered: Memory Leaks and Spectre v2 Exploits

Recent research from ETH Zürich has unveiled critical security flaws in modern Intel processors, highlighting ongoing challenges in CPU security. These vulnerabilities, notably Branch Privilege Injection (BPI) and Training Solo, pose significant risks by potentially allowing unauthorized access to sensitive data.

Branch Privilege Injection (BPI):

BPI exploits race conditions in the CPU’s branch prediction mechanism. When a processor switches between prediction calculations for users with different privilege levels, it can inadvertently expose sensitive information. This flaw affects all Intel processors, enabling attackers to read data from the processor’s cache and the working memory of other users on the same CPU. Intel has addressed this vulnerability with microcode updates, assigning it CVE-2024-45332 with a CVSS v4 score of 5.7.

Training Solo:

Researchers from VUSec at Vrije Universiteit Amsterdam have identified a new class of Spectre v2 attacks termed Training Solo. These attacks allow speculative control flow hijacking within the same domain, such as the kernel, leading to potential data leaks across privilege boundaries. This re-enables traditional Spectre v2 scenarios without relying on environments like eBPF. The vulnerabilities, tracked as CVE-2024-28956 and CVE-2025-24495, can leak kernel memory at rates up to 17 Kb/s, effectively breaking domain isolation and facilitating user-to-user, guest-to-guest, and even guest-to-host attacks. Intel has released microcode updates to mitigate these issues.

Broader Context:

These discoveries underscore the persistent nature of speculative execution vulnerabilities in modern processors. Since the initial disclosure of Spectre and Meltdown in 2018, numerous related flaws have been identified, including Foreshadow, Reptar, Hertzbleed, Retbleed, and Downfall. Each of these exploits leverages the CPU’s speculative execution features to access sensitive data, highlighting the need for ongoing vigilance and robust mitigation strategies in hardware design and software implementation.

Mitigation and Recommendations:

Intel has responded to these vulnerabilities by releasing microcode updates. Users are strongly advised to apply these updates promptly to protect their systems. Additionally, maintaining up-to-date operating systems and software, along with adhering to best security practices, is crucial in mitigating potential exploits.

Conclusion:

The identification of BPI and Training Solo vulnerabilities serves as a reminder of the complexities involved in CPU security. As processors become more advanced, the potential for sophisticated attacks increases, necessitating continuous research, timely updates, and a proactive approach to cybersecurity to safeguard sensitive information.