Share this article
Latest news
With KB5043178 to Release Preview Channel, Microsoft advises Windows 11 users to plug in when the battery is low
Copilot in Outlook will generate personalized themes for you to customize the app
Microsoft will raise the price of its 365 Suite to include AI capabilities
Death Stranding Director’s Cut is now Xbox X|S at a huge discount
Outlook will let users create custom account icons so they can tell their accounts apart easier
Windows 10 gets silent security patch to deal with SWAPGS vulnerability
2 min. read
Published onAugust 7, 2019
published onAugust 7, 2019
Share this article
Read our disclosure page to find out how can you help Windows Report sustain the editorial teamRead more
Windows PCs withIntelandAMDchips might be vulnerable again, asSpectrereturns after almost a year.
New SWAPGS vulnerability bypasses previous mitigations
This time, the designated CVE-2019-1125 issue similar to Spectre and Meltdown is more powerful and bypasses previous security barriers.The SWAPGSvulnerabilitymainly affectsIntelCPUs produced after 2012.
Thevulnerabilityreads sensitive kernel memory and amalware attackcould use it to get passwords and encryption keys out of RAM.
As such,Microsoftreleased a silentpatchto address the problem. The update to the Linux kernel was part of last month’sPatch Tuesday, but it wasn’t revealed until recently, at theBlackHat security conference.
Updating the kernel seems to solve the problem
Here’s what RedHathad to sayaboutCVE-2019-1125:
Red Hat has been made aware of an additional spectre-V1 like attack vector, requiring updates to the Linux kernel. This additional attack vector builds on existing software fixes shipped in previous kernel updates. Thisvulnerabilityonly applies to x86-64 systems using eitherIntelorAMDprocessors.
This issue has been assignedCVE-2019-1125and is ratedModerate.
An unprivileged local attacker can use these flaws to bypass conventional memory security restrictions to gain read access to privileged memory that would otherwise be inaccessible.
Because thekernelpatchbuilds on existing spectre mitigations from previous updates, the only solution is updating the kernel and rebooting the system.
NeitherAMDnorIntelare extremely concerned with the issue, and don’t have plans to release microcode updates because thevulnerabilitycan be addressed in software.
Bitdefender, who originally found Spectre, createda pagethat will give you more info on how to protect your system against critical SWAPGS attacks.
More about the topics:amd,Cybersecurity,intel,windows 10
Vlad Turiceanu
Windows Editor
Passionate about technology,Windows, and everything that has a power button, he spent most of his time developing new skills and learning more about the tech world.
Coming from a solid background in PC building and software development, with a complete expertise in touch-based devices, he is constantly keeping an eye out for the latest and greatest!
User forum
0 messages
Sort by:LatestOldestMost Votes
Comment*
Name*
Email*
Commenting as.Not you?
Save information for future comments
Comment
Δ
Vlad Turiceanu
Windows Editor
Coming from a solid background in PC building and software development, he’s a Windows 11 Privacy & Security expert.