Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Chipmaker Patch Tuesday: Intel, AMD, Arm Respond to New CPU Attacks

Posted on May 14, 2025May 14, 2025 By CWS

Chip giants Intel, AMD and Arm every printed Patch Tuesday safety advisories to tell prospects about vulnerabilities discovered lately of their merchandise, together with ones associated to newly disclosed CPU assaults.

One of many CPU assaults was disclosed this week by researchers at Swiss college ETH Zurich. The researchers found a department privilege injection subject, tracked as CVE-2024-45332, that they declare “brings again the complete may of department goal injection assaults (Spectre-BTI) on Intel”.

The researchers declare that whereas Intel’s Spectre-BTI (aka Spectre v2) mitigations have labored for almost six years, they’ve now discovered a approach to break them on account of a race situation impacting Intel CPUs. 

Spectre-style assaults may permit an attacker who has entry to the focused system to acquire doubtlessly worthwhile data from reminiscence, resembling encryption keys and passwords.

In its advisory, Intel stated it’s releasing microcode updates to mitigate CVE-2024-45332, which it described as a delicate data disclosure subject. 

AMD has printed an advisory to tell prospects that — as acknowledged by the researchers as properly — the vulnerability doesn’t impression its CPUs.

One other CPU assault was disclosed this week by researchers at Dutch college VU Amsterdam. Their evaluation, dubbed Coaching Solo, led to the invention of three new courses of self-training Spectre v2 assaults, which spotlight the constraints of area isolation.

The researchers developed two exploits in opposition to Intel CPUs that may leak kernel reminiscence at as much as 17 Kb/s, and so they discovered two new {hardware} flaws (tracked as CVE-2024-28956 and CVE-2025-24495), which “utterly break the area isolation and re-enable conventional user-user, guest-guest, and even guest-host Spectre-v2 assaults”.Commercial. Scroll to proceed studying.

Intel stated it’s releasing microcode updates and prescriptive steering to mitigate these vulnerabilities. 

AMD has printed an advisory to say that its CPUs usually are not impacted by this assault. Arm CPUs, alternatively, could also be impacted. The chipmaker advised prospects that whereas this isn’t a brand new vulnerability, its safety steering has been up to date to extra explicitly spotlight the dangers.

Intel has printed 25 new advisories protecting dozens of vulnerabilities discovered throughout its merchandise. 

The chip large has patched high-severity vulnerabilities that may result in data disclosure, DoS assaults or privilege escalation in Tiber Edge Platform, Graphics and Graphics Driver, Server Board, PROSet/Wi-fi, Gaudi, Xeon, Ethernet Community Adapter, Slim Bootloader, and Simics Bundle Supervisor merchandise.

Medium-severity points have been addressed in Intel’s RealSense, Ethernet Community Adapter, Ethernet Connections Boot Utility, oneAPI Degree Zero, OpenVINO, Advisor, Endurance Gaming Mode, Arc GPU, Core and Xeon CPU, oneAPI DPC++/C++ Compiler, and QuickAssist Know-how merchandise. 

AMD has printed three different new advisories. One covers 4 high-severity vulnerabilities in AMD Manageability Instruments — their exploitation can result in privilege escalation and doubtlessly arbitrary code execution.

One other advisory describes two high-severity flaws in AMD Optimizing CPU Libraries (AOCL), which may be exploited for privilege escalation and probably code execution. The final advisory covers a medium-severity subject in uProf that may be exploited to delete arbitrary recordsdata. 

Associated: Intel TDX Join Bridges the CPU-GPU Safety Hole

Associated: AMD Patches CPU Vulnerability That May Break Confidential Computing Protections

Associated: New SLAP and FLOP CPU Assaults Expose Information From Apple Computer systems, Telephones

Security Week News Tags:AMD, Arm, Attacks, Chipmaker, CPU, Intel, Patch, Respond, Tuesday

Post navigation

Previous Post: Samsung MagicINFO 9 Server Vulnerability Let Attackers Write Arbitrary File
Next Post: Is AI Use in the Workplace Out of Control?

Related Posts

In Other News: Nvidia Says No to Backdoors, Satellite Hacking, Energy Sector Assessment Security Week News
Adidas Data Breach Linked to Third-Party Vendor Security Week News
Prometei Botnet Activity Spikes – SecurityWeek Security Week News
Identity Is the New Perimeter: Why Proofing and Verification Are Business Imperatives Security Week News
Hackers Abuse ConnectWise to Hide Malware Security Week News
CISA Warns of Flaw in TeleMessage App Used by Ex-National Security Advisor  Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • A Free Zero Trust Web Application Firewall for 2026
  • How Businesses Stop Complex Social Engineering Attacks Early
  • GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models
  • Slow and Steady Security: Lessons from the Tortoise and the Hare
  • Elastic Refutes Claims of Zero-Day in EDR Product

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • A Free Zero Trust Web Application Firewall for 2026
  • How Businesses Stop Complex Social Engineering Attacks Early
  • GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models
  • Slow and Steady Security: Lessons from the Tortoise and the Hare
  • Elastic Refutes Claims of Zero-Day in EDR Product

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News