Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»New VMSCAPE attack broke the guest-host separation on AMD, Intel CPUS
    Security

    New VMSCAPE attack broke the guest-host separation on AMD, Intel CPUS

    PineapplesUpdateBy PineapplesUpdateSeptember 14, 2025No Comments4 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    New VMSCAPE attack broke the guest-host separation on AMD, Intel CPUS
    Share
    Facebook Twitter LinkedIn Pinterest Email

    New VMSCAPE attack broke the guest-host separation on AMD, Intel CPUS

    A new spectre-like attack VMSCAPE allows a malicious virtual machine (VM) to leak the cryptographic keys from a malicious virtual machine (VM) an unlikely QEMU hypervise process running on modern AMD or Intel CPU.

    The attack broke the separation between VM and Cloud Hyper -wise, bypassing the current speaker mitigation and threatened to leak sensitive data by taking advantage of speculative execution.

    Researchers highlight that VMSCAPE does not need to compromise the host and works on unmarried virtualization software with competent default mitigations on hardware.

    They note that a danger can deploy such an attack against the cloud provider by renting a virtual machine to leak mysteries from actor Hypervizer or other VM.

    VMScape was developed by a team Ath Zurich’s researcher Public University in Switzerland, who discovered that it affects all AMD processors from Zen 1 to Zen 5, as well as Intel’s “Coffee Lake” CPU. The new, “raptor coves” and “gsemont” are not affected.

    Leaked mystery from Qemu

    The modern CPU protects from speculative attacks by expanding the separation between guests and hosts to the branch prediction units (BPU), but researchers found that the separation was incomplete.

    Host and guest separation detected by VMScape
    Host for guest separation
    Source: Eth Zurich

    A guest user may affect the indirect branch prediction in a host user process due to shared BPU structures such as BTB (branch target buffer), IBP/ITA, and BHB (BHB history buffer).

    The attack QEMU targets the user-mode hyper-wigor component, which maps the guest memory in its address space, which enables the use of ‘flush+reload’ cache side channels.

    Eth Zurich Researchers used a spectre-BTI (branch target injection) attack to mislead a target indirect branch in the Qemu, so it executes a disclosure gadget that leaks secret data in the shared reload buffer.

    Overview of attack
    Overview of attack
    Source: Eth Zurich

    To expand the speculative execution window, the attacker AMD Zen 4 withdraws the relevant cash entries from inside the guest by constructing a target set that targets the final level cash (LLC) on the CPU.

    The ASLR (address space layout randomization), a security facility that rands the memory address, where the data is loaded in a process, is defeated by examining the afflicted gadget to detect the branch and defeated for a branch conflict and to reject the virtual address of the reload buffer.

    ETH Zurich researchers showed that VMSCPE leakes arbitrary memory data from Cumu at the rate of 32 bytes/seconds, with 98.7%by-level accuracy and overall exploitation of 43%.

    At this rate, a 4KB secret, such as the disc encryption key, may leaked in 128 seconds. The total end-to-end time, 772 seconds, including the ASLR bypassing process will be less than 13 minutes.

    https://www.youtube.com/watch?v=g_qdnfi2e4s

    Impact and reaction

    Virtualization is the backbone of cloud computing, and if a guest machine can read memory from the host, it is a threat to multi-tenant cloud protection.

    However, it is necessary to emphasize that attacks such as VMSCPE require advanced knowledge, deep technical expertise and continuous execution time. Because of this, such attacks, even if possible, do not represent danger to large userbase.

    Processor generations affected by vmscape
    Processor generations affected by vmscape
    Source: Eth Zurich

    The Ath Zurich team reported their findings to AMD and Intel on 7 June, and the issue was identified CVE-2015-40300. AMD has released one Security bulletin about the problem.

    Linux kernel developers issued patches that reduce VMSCAPE by adding IBPB (indirect branch prediction barrier) to VMEXIT, which effectively flush the BPU while switching from the host to the host. Researchers say that this mitigation has a minimum performance effect in the general charge.


    Picus Blue Report 2025

    The passwords broke in 46% of the atmosphere, almost doubled by 25% last year.

    Picus Blue Report 2025 Now get a wider look at more conclusions on prevention, detection and data exfIs.

    AMD Attack broke CPUS guesthost Intel separation VMSCAPE
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleExploitation of Akira Rainmware is important sonicwall sslvpn bug again
    Next Article Should you upgrade the iPhone 17 Pro from last year’s model? I am – why is here
    PineapplesUpdate
    • Website

    Related Posts

    Startups

    Your Bluetooth headphones may be under attack – here’s what to do next

    January 15, 2026
    Startups

    Intel spinout Articul8 raises more than half of $70M round at $500M valuation

    January 7, 2026
    Startups

    Your smart home is at risk – 6 ways to protect your devices from attack

    December 6, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Google tests AI-operated audio overview in search results for some questions

    June 16, 20250 Views

    Yes, this was the original voice of the Garat in the trailer for the thief VR

    June 16, 20250 Views

    This browser is designed for those who never close tabs

    June 16, 20250 Views
    Our Picks

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2026 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.