An international team of researchers from the University of Birmingham’s School of Computer Science along with researchers from imec-DistriNet (KU Leuven) and Graz University of Technology has been investigating how these interfaces can be exploited in Intel Core processors to undermine the system’s security in a project called Plundervolt.
Results released today and accepted to IEEE Security & Privacy 2020, show how the team was able to corrupt the integrity of Intel SGX on Intel Core processors by controlling the voltage when executing enclave computations – a method used to shield sensitive computations for example from malware. This means that even Intel SGX's memory encryption and authentication technology cannot protect against Plundervolt.
Intel has already responded to the security threat by supplying a microcode update to mitigate Plundervolt. The vulnerability has a CVSS base score of 7.9. high under CVE-2019-11157.
- Vulnerable processors are Intel 6th, 7th, 8th, 9th and 10th Generation Core Processors, Intel Xeon E3 v5 & v6, and Intel Xeon E-2100 & E-2200 families
- Intel Advisory and Patches (INTEL-SA-00289)
- For more videos of the exploitation and FAQs, head over to https://plundervolt.com/
- Plundervolt white paper - Plundervolt: Software-based Fault Injection Attacks against Intel SGX