Category Archives: Vulnerabilities

Auto Added by WPeMatico

AMD addresses Sinkclose vulnerability but older processors left unattended

Though AMD has released security updates to address the “Sinkclose” vulnerability in its processors, some of its older and still-popular chips will not be receiving patches. The flaw, disclosed by researchers from security firm IOActive, affects processors dating back to 2006 and could allow attackers to infiltrate systems undetected. While AMD has rolled out mitigation […]

AMD CPUs impacted by 18-year-old SMM flaw that enables firmware implants

AMD has issued microcode updates for a wide range of server and desktop CPUs to address a vulnerability that could allow attackers to bypass protections for the System Management Mode (SMM) and execute malicious code in the low-level firmware outside of the OS. The flaw could be used to deploy stealthy boot-level rootkits in UEFI […]

New Linux kernel cross-cache attack allows arbitrary memory writes

Researchers from the Graz University of Technology have discovered a way to convert a limited heap vulnerability in the Linux kernel into a malicious memory writes capability to demonstrate novel software cross-cache attacks. While such vulnerabilities are known to be restricted in capabilities, allowing the corruption of only a few bytes in restricted allocator caches, […]

12 wide-impact firmware vulnerabilities and threats

Nowadays all major operating systems and software programs receive automatic security updates that help users secure their systems against the barrage of vulnerabilities discovered every month. But this is still not the case for billions of embedded devices that impact our everyday lives. From devices used in critical infrastructure and hospitals to those used in […]

VMware ESXi hypervisor vulnerability grants full admin privileges

Security researchers at Microsoft have discovered a vulnerability in VMware ESXi hypervisors that has been exploited by ransomware operators to gain full administrative access to a domain-joined hypervisor. The problem, identified as CVE-2024-37085, granted full admin privileges to members of a domain group, without proper validation. It has been used by several ransomware groups such […]

Secure Boot no more? Leaked key, faulty practices put 900 PC/server models in jeopardy

Security researchers warn that some PC and server manufacturers are using insecure cryptographic keys as the root of trust for Secure Boot, an important security feature in modern computers that prevents malware from injecting itself early into the boot process. One of those keys has been leaked accidentally, potentially breaking Secure Boot guarantees for hundreds […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.