Microarchitectural Data Sampling (or MDS) side-channel vulnerabilities in Intel CPUs. ( 4 newly disclosed )

https://mdsattacks.com/

RIDL and Fallout: MDS attacks

Attacks on the newly-disclosed “MDS” hardware vulnerabilities in Intel CPUs


The RIDL and Fallout speculative execution attacks allow attackers to leak private data across arbitrary security boundaries on a victim system, for instance compromising data held in the cloud or leaking your data to malicious websites. Our attacks leak data by exploiting the 4 newly disclosed Microarchitectural Data Sampling (or MDS) side-channel vulnerabilities in Intel CPUs. Unlike existing attacks, our attacks can leak arbitrary in-flight data from CPU-internal buffers (Line Fill Buffers, Load Ports, Store Buffers), including data never stored in CPU caches. We show that existing defenses against speculative execution attacks are inadequate, and in some cases actually make things worse. Attackers can use our attacks to leak sensitive data despite mitigations, due to vulnerabilities deep inside Intel CPUs.

MDS Tool from RIDL Team at the link to test your system.

Enjoy reading about how your Intel CPUs leak data like a seive at the link above.

Cheers