By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
Computing

Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks

News Room
Last updated: 2025/05/16 at 5:51 AM
News Room Published 16 May 2025
Share
SHARE

May 16, 2025Ravie LakshmananHardware Security / Vulnerability

Researchers at ETH Zürich have discovered yet another security flaw that they say impacts all modern Intel CPUs and causes them to leak sensitive data from memory, showing that the vulnerability known as Spectre continues to haunt computer systems after more than seven years.

The vulnerability, referred to as Branch Privilege Injection (BPI), “can be exploited to misuse the prediction calculations of the CPU (central processing unit) in order to gain unauthorized access to information from other processor users,” ETH Zurich said.

Kaveh Razavi, head of the Computer Security Group (COMSEC) and one of the authors of the study, said the shortcoming affects all Intel processors, potentially enabling bad actors to read the contents of the processor’s cache and the working memory of another user of the same CPU.

Cybersecurity

The attack leverages what’s called Branch Predictor Race Conditions (BPRC) that emerge when a processor switches between prediction calculations for two users with different permissions, opening the door to a scenario where an unprivileged hacker could exploit it to bypass security barriers and access confidential information from a privileged process.

Intel has issued microcode patches to address the vulnerability, which has been assigned the CVE identifier CVE-2024-45332 (CVSS v4 score: 5.7).

“Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution in the indirect branch predictors for some Intel Processors may allow an authenticated user to potentially enable information disclosure via local access,” Intel said in an advisory released on May 13.

The disclosure comes as researchers from the Systems and Network Security Group (VUSec) at Vrije Universiteit Amsterdam detailed a category of self-training Spectre v2 attacks codenamed Training Solo.

“Attackers can speculatively hijack control flow within the same domain (e.g., kernel) and leak secrets across privilege boundaries, re-enabling classic Spectre v2 scenarios without relying on powerful sandboxed environments like eBPF,” VUSec said.

Cybersecurity

The hardware exploits, tracked as CVE-2024-28956 and CVE-2025-24495, can be used against Intel CPUs to leak kernel memory at up to 17 Kb/s, with the study finding that they could “completely break the domain isolation and re-enable traditional user-user, guest-guest, and even guest-host Spectre-v2 attacks.”

  • CVE-2024-28956 – Indirect Target Selection (ITS), which affects Intel Core 9th-11th, and Intel Xeon 2nd-3rd, among others.
  • CVE-2025-24495 – Lion Cove BPU issue, which affects Intel CPUs with Lion Cove core

While Intel has shipped microcode updates for these defects, AMD said it has revised its existing guidance on Spectre and Meltdown to explicitly highlight the risk from the use of classic Berkeley Packet Filter (cBPF).

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Netgear Orbi 870 Series
Next Article Restaurant chain closes 15 stores – diners were met with ominous sign
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Best Laptop Deal of the Day: 26% Off an Editors’ Choice-Winng Lenovo Midranger
News
You buy a dumb phone – make your smartphone less distracting
Gadget
As tariffs come for tech, these are the best budget laptops we’ve tested
News
Japan moves closer to requiring third-party app stores
News

You Might also Like

Computing

The TechBeat: The State of Cloud Storage: #Decentralize-Cloud (5/17/2025) | HackerNoon

5 Min Read
Computing

NVIDIA Upstreams Newer GSP Firmware For Open-Source Nouveau Driver

1 Min Read
Computing

Kanessa Muluneh is building a Web3 game for Africans

15 Min Read
Computing

FreeBSD 14.3 Beta 3 Brings KDE Plasma 6 Packages To The DVD ISOs

2 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?