Intel Processor Core i7 in Germany dedicated server

Security advisory: Mitigate MDS bug in Intel CPU

Intel Processor Core i7 in Germany dedicated server

After Meltdown and Spectre attacks , now IT world is dealing with 4 newly discovered and even more dangerous vulnerabilities in Intel CPU, MDS. These new security vulnerabilities, which of Zombieload being the worst,  allow hackers to read the CPU processed data, including keys, from the cache while no particular access required!

These are the 4 MDS attacks that are recognized:

CVE-2018-11091 – Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
CVE-2018-12126 – Microarchitectural Store Buffer Data Sampling (MSBDS) [codenamed Fallout]
CVE-2018-12127 – Microarchitectural Load Port Data Sampling (MLPDS)
CVE-2018-12130 – Microarchitectural Fill Buffer Data Sampling (MFBDS) [codenamed Zombieload, or RIDL]

 

How to mitigate against MDS attacks:

Intel already published the MDS mitigation microcode for its hardware but usually normal users wont update their hardware and that’s why we should rely on OS updates.

Microsoft provided the update required for this MDS attack mitigation. If you set your Windows to download and install updates automatically (which we always recommend), you are safe, otherwise you should update the OS immediately.

Red Hat and Ubuntu patches are available too, so your OS update should fix the issue and you would be good to to. KernelCare also will start releasing the patch for its clients.

You can see how important is it to keep the OS update, so if you care about your properties, ALWAYS keep the OS updated.