The processors Intel are vulnerable to a new attack known as SGAxe that violates the security guarantees of Intel Software Guard eXtensions (SGX) pockets. This attack specifically targets and steals - leaks data from Intel processors. The SGAxe attack is an evolution of the CacheOut attack, also known as the L1D Eviction Sampling, and was discovered in January 2020 by researchers at the University of Michigan, the University of Adelaide and Data61. The CacheOut attack is identified as CVE-2020-0549 and may allow authorized persons invaders that have local access to targeted machinery to disclose information due to clearing errors in the temporary data memory of some Intel processors. Intel Software Guard eXtensions (SGX) is a modern feature feature security of Intel processors that allows applications to run in pockets (isolated memory areas built into the CPU), providing encryption memory based on material that isolates it code and application data in μνήμη.
The SGAxe attack allows SGX authentication keys to be extracted from an Intel pocket, allowing network intruders to "cryptographically forge" legitimate Intel SGX machines. The researchers used attacks SGAxe and CacheOut to steal private keys from the up-to-date and reliable SGX machines, explaining that they can arbitrarily compile SGX receipts that are then legally considered by Intel's certification service.
CacheOut and SGAxe mitigation
Intel will mitigate CacheOut and SGAxe attacks by providing microcode updates CPU to suppliers OEM to correct the "root" of the problem. These updates will then be delivered to end users as BIOS updates, with Intel also performing a Trusted Compute Base (TCB) recovery to override all previous signature and certificate collection keys. This process ensures that a system is secure and can therefore re-use remote authentication. However, since these are errors in the processor silicon, the software may mitigate these issues in the cost of performance and / or performance.
Intel will have to release repairs to address these issues to newer generations of processors, so that these attacks are not as successful as software mitigation.
Most Intel processors are vulnerable to attack. The SGAxe attack can be used on machines that use 9th generation Intel Coffee Lake Refresh processors, which are fully updated with all the SGX countermeasures that Intel has published so far. SGAxe only affects Intel processors, as its platform is the only one that offers Intel SGX capability. The SGAxe attack will be mitigated in the same microcode update designed to mitigate the CacheOut speculative attack. The full list of processors that may be affected by SGAxe was published by PSIRT.