https://www.trendmicro.com/vinfo/id...e-from-av-solutions-via-intel-s-sgx-enclaves/
https://www.bleepingcomputer.com/ne...fallout-attacks-impact-all-modern-intel-cpus/
All three attacks are feasible in real-life scenarios. An attacker running malicious code on a vulnerable machine, or pointing the victim to a webpage with malicious JavaScript can steal sensitive information on the system, like passwords and cryptographic keys.
VUSec shows in the sped-up video below how they obtained information from the /etc/shadow file - where a Linux machine keeps encrypted password, account or expiration values.
They were able to do this by continuously trying to authenticate via an SSH connection. For now, the entire process takes about 24 hours.
This is because small pieces of info are extracted each time an SSH connection initiates. The duration depends on the type of data targeted and in some cases it could take less than a minute to extract it.
In another demo video, the researchers show that they were able to use RIDL to leak recent kernel data.
After first reading 0 bytes from /proc/version, the team could leak the full contents of /proc/version, even if the data was never present in the userspace.
"If you disable hyperthreading and at the same time you use Intel’s proposed mitigation (that is, using the very instruction) the MDS vulnerabilities are mitigated on old Intel processors," VUSec's Pietro Frigo told BleepingComputer.