- Joined
- Aug 20, 2006
- Messages
- 13,000
Yuriy Bulygin, who once headed Intel's advanced threat team, has discovered that Spectre variant 1 can be modified with kernel privileges to break into the System Management Mode (SMM) of x86 systems. These attacks would “allow an unprivileged attacker to read the contents of memory, including memory that should be protected by the range registers, such as SMM memory."
Bulygin said he's been working with Intel since March and that Intel believes its guidance to mitigate Spectre variant 1 and Spectre variant 2 should also be applied to SMM. "We have reviewed Eclypsium's research and, as noted in their blog, we believe that the existing guidance for mitigating variant 1 and variant 2 will be similarly effective at mitigating these scenarios," an Intel spokesperson said.
Bulygin said he's been working with Intel since March and that Intel believes its guidance to mitigate Spectre variant 1 and Spectre variant 2 should also be applied to SMM. "We have reviewed Eclypsium's research and, as noted in their blog, we believe that the existing guidance for mitigating variant 1 and variant 2 will be similarly effective at mitigating these scenarios," an Intel spokesperson said.