Home > HOW TO GUIDES > How to Stop an Intel Foreshadow Bug Exploit Attack
HOW TO

How to Stop an Intel Foreshadow Bug Exploit Attack

Several execution vulnerabilities has been detected to affect Intel Processors. The vulnerabilities which were detected so far have been reported to be an execution type of flaws and were quickly named Foreshadow.




The vulnerabiltities aim to gain control of the Intel™ Core and Intel™ Xeon type of processors. The name of the bugs assigned by Intel is Foreshadow, and these vulnerabilities are L1TF (Terminal Fault) flaws. The bugs have been tracked under the following security code names:

  • CVE-2018-3615
  • CVE-2018-3620
  • CVE-2018-3646

According to the official description, the vulnerabilities can allow the following attack to take place:

Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.

The bugs can allow attacks that can extract information from the affected computers, like the cryptographic keys for the processor’s architecture, data from System Management Mode of the kernel and data from virtual machines running on the host system.




Even though the three Foreshadow vulnerabilities have not been detected in the wild in relation to any malware, researchers have managed to find a method via which they can conduct an attack that can function properly. So far, Intel have not released infromation on how this information can be used to conduct an attack and for good reason.

The only information disclosed is the affected device models which have been reported to be the following:

  • All SGX-enabled processors (Skylake and Kaby Lake)
  • Intel Core™ i3/i5/i7/M processor (45nm and 32nm)
  • 2nd/3rd/4th/5th/6th/7th/8th generation Intel Core processors
  • Intel Core X-series Processor Family for Intel X99 and X299 platforms
  • Intel Xeon processor 3400/3600/5500/5600/6500/7500 series
  • Intel Xeon Processor E3 v1/v2/v3/v4/v5/v6 Family
  • Intel® Xeon® Processor E5 v1/v2/v3/v4 Family
  • Intel® Xeon® Processor E7 v1/v2/v3/v4 Family
  • Intel® Xeon® Processor Scalable Family
  • Intel® Xeon® Processor D (1500, 2100)

More in-depth information on the Foreshadow vulnerabilities can be found in the related story below:

Related: Intel Processors Affected with Foreshadow Speculative Execution Flaws

So How to Protect Oneself from Foreshadow?

If your PC is running with an Intel chip from the list above, you should know that it is potentially vulnerable to this flaw. Fortunately, Intel has created micro-patches on a micro-code type of update in order to fix these vulnerabilities. If you want to protect yourself effectively against it, you can download a new firmware for your computer model, in case such is available. This can happen if you download the latest UEFI and BIOS Intel Updates or install microcode updates, downloaded directly from Microsoft themselves. This can happen either if you look up your computer model and see on It’s vendor if an official update is available or by checking your processor model as well. Another way to do it is by visiting Microsoft’s website for the updates.

Ventsislav Krastev

Ventsislav is a cybersecurity expert at SensorsTechForum since 2015. He has been researching, covering, helping victims with the latest malware infections plus testing and reviewing software and the newest tech developments. Having graduated Marketing as well, Ventsislav also has passion for learning new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management, Network Administration and Computer Administration of System Applications, he found his true calling within the cybersecrurity industry and is a strong believer in the education of every user towards online safety and security.

More Posts - Website

Follow Me:
Twitter

Leave a Comment

Your email address will not be published. Required fields are marked *

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree