Security researchers discovered SWAPGS, a new Specter flaw affecting Intel and AMD processors

Researchers have found a new version of the Specter vulnerability, named SWAPGS that affects modern Intel and some models of AMD processors using speculative execution.

The security issue is named SWAPGS. The experts assigned the vulnerability identifier CVE-2019-1125.

Using this gap, an attacker can gain access to confidential information stored in the kernel memory of the operating system. This data may include passwords, tokens, and encryption keys.

Read also: IS experts discover BlueKeep-vulnerabilities scanner in Watchbog cryptominer

Bitdefender experts were the first to notice the security issue.

“The attack is a novel approach of leaking sensitive information from the kernel since it bypasses all known side-channel attack mitigation techniques. This is achieved by abusing the fact that SWAPGS instruction can be executed speculatively. An attacker can force arbitrary memory dereferences in kernel, which leaves traces within the data caches. These signals can be picked-up by the attacker to infer the value located at the given kernel address”, — reported Bitdefender specialists.

In response, Microsoft developers emphasized that they eliminated CVE-2019-1125 with the release of the July patch set.

“To successfully exploit this vulnerability, an attacker must log into the target system and launch a specially crafted application. The gap itself does not allow increasing the rights in the system, however, the attacker can collect information that will later be used for further compromise”, — Microsoft said.

Red Hat developers also issued a warning about SWAPGS.

“There is no known complete mitigation other than updating the kernel and rebooting the system. This kernel patch builds on existing spectre mitigations from previous updates”, — says Red Hat message.

Microsoft has not identified any mitigating factors for this vulnerability too.

Sending
User Review
0 (0 votes)
Comments Rating 0 (0 reviews)

About the author

Brendan Smith

Cybersecurity analyst with 15+ years digging into malware and threats, from early days reverse-engineering trojans to leading incident responses for mid-sized firms.

At Gridinsoft, I handle peer-reviewed breakdowns of stuff like AsyncRAT ransomware—last year, my guides helped flag 200+ variants in real scans, cutting cleanup time by 40% for users. Outside, I write hands-on tutorials on howtofix.guide, like step-by-step takedowns of pop-up adware using Wireshark and custom scripts (one post on VT alternatives got 5k reads in a month).

Certified CISSP and CEH, I’ve run webinars for 300+ pros on AI-boosted stealers—always pushing for simple fixes that stick, because nobody has time for 50-page manuals. Tools of the trade: Splunk for hunting, Ansible for automation, and a healthy dose of coffee to outlast the night shifts.

Leave a Reply

Sending