Heimdal Security Blog

Downfall Vulnerability Exposes Intel CPUs to Data and Encryption Keys Stealing

Downfall Intel vulnerability

Downfall vulnerability impacts various Intel microprocessors and enables encryption keys, passwords, and other sensitive data exfiltration. The flaw was dubbed CVE-2022-40982 and was reported to Intel by security researcher Daniel Moghimi.

The researcher provided a proof-of-concept that leverages the Gather instruction in two ways.

Intel released patches for the Downfall vulnerability that impacts recently sold microprocessors and also older ones, produced even as far as 2014. However, the flaw does not affect Intel’s newest processors.

Details on the Exfiltration Methods

The Gather instruction is a memory optimization feature that helps access scattered data in memory faster. Moghimi discovered two ways to exploit the vulnerability:

Threat actors that are on the same physical processor core could leverage the Downfall flaw to exfiltrate:

Which Intel Products Are at Risk?

According to BleepingComputer, the vulnerability does not work on Alder Lake, Raptor Lake, and Sapphire Rapids. The three vulnerable families of processors are:

General Impact and Mitigation Measures

Daniel Moghini notified Intel about his discovery on August 24th, 2022, and collaborated with them to help prevent further risk. The researcher claims that users were exposed to the Downfall flaw for more than nine years, as the impacted processors were available to the public starting in 2014.

While Intel advises users to update devices to the latest version, Moghini also had four recommendations:

The Downfall vulnerability impacts billions of users worldwide. Since the proof-of-concept code is already available on GitHub, patching endpoints in a timely manner is strongly recommended.

Due to the large volume of impacted devices, automated patch management solutions help security admins save precious time and resources. Get a free demo of Heimdal`s automated patch management tool to evaluate the benefits.

If you liked this article, follow us on LinkedIn, Twitter, Facebook, and Youtube, for more cybersecurity news and topics.

Install and Patch Software. Close Vulnerabilities. Achieve Compliance.

Heimdal® Patch & Asset Management

Remotely and automatically install Windows, Linux and 3rd party patches and manage your software inventory.
  • Create policies that meet your exact needs;
  • Full compliance and CVE/CVSS audit trail;
  • Gain extensive vulnerability intelligence;
  • And much more than we can fit in here...
Try it for FREE today 30-day Free Trial. Offer valid only for companies.