Your PC might need an update to fight ‘Foreshadow’

Your PC might need an update to fight ‘Foreshadow’

A newly discovered processor vulnerability could potentially put secure information at risk in any Intel-based PC manufactured since 2008.

It could affect users who rely on a digital lockbox feature known as Intel Software Guard Extensions, or SGX, as well as those who use common cloud-based services.

Researchers identified the SGX security hole, called Foreshadow, in January and informed Intel. That led Intel to discover its broader potential in the cloud.

This second variant, Foreshadow-NG, targets Intel-based virtualization environments that cloud computing providers like Amazon and Microsoft use to create thousands of virtual PCs on a single large server.

Intel has released software and microcode updates to protect against both varieties of attack. Cloud providers will need to install the updates to guard their machines.

On an individual level, the owners of every SGX-capable Intel PC manufactured since 2016 will need an update to protect their SGX.

Some of these updates will be installed automatically while others will need to be installed manually, depending on a machine’s configuration.

Researchers will demonstrate the flaw on August 16 at the Usenix Security Symposium in Baltimore.

It’s similar to Spectre and Meltdown, the hardware-based attacks that shook the computer security world in early 2018. Researchers were able to break several security features that are present in most Intel-based machines.

“SGX, virtualization environments, and other similar technologies are changing the world by enabling us to use computing resources in new ways, and to put very sensitive data on the cloud—medical records, cryptocurrency, biometric information like fingerprints,” says Ofir Weisse, graduate student research assistant in computer science and engineering at the University of Michigan and an author of the paper to appear at Usenix.

“Those are important goals, but vulnerabilities like this show how important it is to proceed carefully.”

The Software Guard Extensions feature that the Foreshadow demonstration attack targets is not in wide use today.

Because just a handful of cloud providers and a few hundred thousand customers use it, it’s lying dormant on the vast majority of computers equipped with it, and those machines are not vulnerable at this time. That said, the researchers caution that the threat will grow with the use of the product.

“As long as users install the update, they’ll be fine. And in fact, the vast majority of PC owners don’t use SGX, so it’s not likely to become a major problem right now,” says coauthor Thomas Wenisch, a computer science and engineering associate professor at the University of Michigan.

“The real danger lies in the future, if SGX becomes more popular and there are still large numbers of machines that haven’t been updated. That’s why this update is so important.”

SGX and Foreshadow-NG

SGX creates a digital lockbox called an “secure enclave” in a machine, keeping the data and applications inside isolated from the rest of the machine.

Even if a security vulnerability compromises the entire machine, the data protected by SGX is supposed to remain inaccessible to everyone but the owner of the data.

The main application of SGX is to enable the processing and storage of sensitive information, like proprietary business information or health data, at remote third-party data centers where not even data center employees should be able to access the protected data.

SGX can also control the distribution of copyrighted digital content, for example making a movie viewable only on specific machines.

Foreshadow breaks SGX’s lockbox, enabling an attacker to read and modify the data inside. While this is not the first attack to target SGX, it is the most damaging thus far.

“Previous work could get some of the data some of the time. Foreshadow gets most of the data most of the time,” says coauthor Daniel Genkin, assistant professor of computer science and engineering.

“In addition to reading the data, Foreshadow also extracts what’s called an attestation key. That key enables attackers to masquerade as a secure machine and trick people into sending secret data to it.”

The second variant, Foreshadow-NG, breaks the digital wall that keeps individual cloud customers’ virtual PCs isolated from one another on large servers.

This could enable a malicious virtual machine running in the cloud to read data belonging to other virtual machines. The virtualization code is present in every Intel-based computer manufactured since 2008.

“Foreshadow-NG could break the fundamental security properties that many cloud-based services take for granted,” says coauthor Baris Kasikci, assistant professor of computer science and engineering.

How the attacks work

Both variants of the vulnerability gain access to the victim machine using what’s known as a side channel attack.

These attacks infer information about a system’s inner workings by observing patterns in seemingly innocuous information—how long it takes the processor to access the machine’s memory, for example. This can be used to gain access to the inner workings of the machine.

The attack then confuses the system’s processor by exploiting a feature called speculative execution. Used in all modern CPUs, speculative execution speeds processing by enabling the processor to essentially guess what it will be asked to do next and plan accordingly.

The attack feeds in false information that leads speculative execution into a series of wrong guesses. Like a driver following a faulty GPS, the processor becomes hopelessly lost.

This confusion is then exploited to cause the victim machine to leak sensitive information. In some cases, it can even alter information on the victim machine.

While these vulnerabilities turned up before causing major damage, they expose the fragility of secure enclaves and virtualization technologies, says Ofir Weisse, the graduate student research assistant involved in the work.

He believes that the key to keeping technologies secure lies in making designs open and accessible to researchers so that they can identify and repair vulnerabilities quickly.

Other researchers on the project are from the Belgian research group imec-DistriNet; Technion Israel Institute of Technology; and the University of Adelaide and Data61.

Support for the work came from the Research Fund KU Leuven, the Technion Hiroshi Fujiwara cyber security research center, the Israel Cyber Bureau, National Science Foundation, the US Department of Commerce, National Institute of Standards and Technology, the 2017-2018 Rothschild Postdoctoral Fellowship, and DARPA.

More information about Foreshadow is available at ForeshadowAttack.com.