New Intel Flaw Exposes Secrets on Windows Machines: What to Do

Intel CPU
(Image credit: Intel)

LAS VEGAS — Microsoft last month secretly fixed a serious security flaw in Intel chips that could have reversed all the fixes made by either company in the wake of the Spectre and Meltdown vulnerabilities.

The flaw, discovered a year ago by Bitdefender researchers, was initially dismissed by Intel until Bitdefender provided a proof-of-concept attack that showed how the vulnerability could be exploited. 

Bitdefender disclosed the flaw in conjunction with Microsoft today (Aug. 6) here at the Black Hat security conference, almost one year to the day after Bitdefender's researchers told Intel of the flaw.

"Every machine using newer Intel processors which leverage speculative execution and [run] Windows is affected, including servers and laptops," Bitdefender said in a press release.

Update your Windows system now

Windows users who installed Microsoft's July Patch Tuesday round of updates are protected from this vulnerability. The flaw is less serious on Linux machines running Intel chips, and Bitdefender were not able to provide a proof-of-concept exploit for Linux. 

It was not immediately clear whether or how AMD chips might be affected. Apple machines using Intel chips are not thought to be vulnerable when running macOS, but are vulnerable when they run Windows.

MORE: Meltdown and Spectre: How to Protect Your PC, Mac and Phone

The flaw affects a system instruction in 64-bit Windows called SWAPGS, a kernel-level instruction set introduced with Intel's Ivy Bridge processors in 2012 that can be speculatively executed in user mode. That's a no-no, because system and user functions are meant to be walled off from one another. 

By manipulating this error in SWAPGS's design, an attacker can glean what the system kernel is doing and thereby see a lot of information that should be secret, such as passwords, encryption keys, session tokens and other data meant to be kept within individual applications and processes.

Most importantly, the SWAPGS flaw allows attackers to completely bypass kernel page table isolation (KPTI), the most widely used method of staving off Meltdown and Spectre attacks, as well as all other mitigations for speculative-execution flaws.

It's likely that Bitdefender researchers were the first to discover this flaw, but as the Bitdefender press release stated, "It is possible that an attacker with knowledge of the vulnerability could have exploited it to steal confidential information."

Speculative execution: An educated guess

Speculative execution is a microprocessing shortcut first deployed more than 20 years ago. Since most CPU tasks are actually repetitive and predictable, chip designers at Intel and other chipmakers discovered they could speed up chips by anticipating and executing commands before the commands were actually received. 

In other words, if the user or an application asks for something, the chip can already have done it before the request even comes in. If the actual request doesn't come, the executed code is rolled back, but in most cases, the pre-executed code is actually what ends up being requested and everyone is happy.

However, in January 2018, several groups of researchers simultaneously revealed that speculative execution can leak data that's supposed to be secret. The two most prominent flaws were called Meltdown and Spectre, but several subsequent vulnerabilities and exploits have been found since then. The real fix for all these problems is to completely redesign chips, but to fix the chips already out there, Microsoft, Intel and AMD have issued a series of patches. 

The SWAPGS flaw that Bitdefender found allows attackers to bypass all those patches for all those previously disclosed speculative-execution flaws and steal data again.

Paul Wagenseil

Paul Wagenseil is a senior editor at Tom's Guide focused on security and privacy. He has also been a dishwasher, fry cook, long-haul driver, code monkey and video editor. He's been rooting around in the information-security space for more than 15 years at FoxNews.com, SecurityNewsDaily, TechNewsDaily and Tom's Guide, has presented talks at the ShmooCon, DerbyCon and BSides Las Vegas hacker conferences, shown up in random TV news spots and even moderated a panel discussion at the CEDIA home-technology conference. You can follow his rants on Twitter at @snd_wagenseil.

Latest in Windows Operating Systems
Microsoft Office is finally as it should have been on iPad
Microsoft tests free Word, PowerPoint and Excel apps for Windows — expect a lot of ads
laptop anger
Latest Windows 11 update reportedly breaking major parts of the operating system
Windows 10 logo
Windows 10 end of life set for this year — everything you need to know to get ready
Windows 11 logo on a laptop screen
I reviewed Windows 11, and these are the 5 new features I'm most excited about for 2025
A Windows 11 laptop, demonstrating how to run Android apps on Windows 11
How to remove the Windows 11 news and weather widget
Man typing on Windows 11 laptop
Microsoft confirms major Windows 11 and Windows 10 audio bug is cutting sound on PCs
Latest in News
NFL Sunday Ticket logo for YouTube
NFL Sunday Ticket 2025 pricing revealed — and it's bad news
Ben Mendelsohn in Andor season 2
'Welcome to the Rebellion' — new ‘Andor’ season 2 trailer teases a darker edge
Russian flag with padlock smashing through glass
47 VPNs could be axed from Google Play Store following Russian demands
ChatGPT on iPhone
ChatGPT was down — updates on quick outage
Emma D'Arcy in House of the Dragon season 2
‘House of the Dragon’ season 3 has officially begun filming — what it could mean for the potential release window
AirPods Max in various colors
AirPods Max is getting a big update with lossless audio and ultra-low latency — here's how it works