How to Stop an Intel Foreshadow Bug Exploit Attack
NEWS

How to Stop an Intel Foreshadow Bug Exploit Attack

OFFER

SCAN YOUR PC
with SpyHunter

Scan Your System for Malicious Files
Note! Your computer might be affected by Foreshadow and other threats.
Threats such as Foreshadow may be persistent on your system. They tend to re-appear if not fully deleted. A malware removal tool like SpyHunter will help you to remove malicious programs, saving you the time and the struggle of tracking down numerous malicious files.
SpyHunter’s scanner is free but the paid version is needed to remove the malware threats. Read SpyHunter’s EULA and Privacy Policy

Several execution vulnerabilities has been detected to affect Intel Processors. The vulnerabilities which were detected so far have been reported to be an execution type of flaws and were quickly named Foreshadow.




The vulnerabiltities aim to gain control of the Intel™ Core and Intel™ Xeon type of processors. The name of the bugs assigned by Intel is Foreshadow, and these vulnerabilities are L1TF (Terminal Fault) flaws. The bugs have been tracked under the following security code names:

  • CVE-2018-3615
  • CVE-2018-3620
  • CVE-2018-3646

According to the official description, the vulnerabilities can allow the following attack to take place:

Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.

The bugs can allow attacks that can extract information from the affected computers, like the cryptographic keys for the processor’s architecture, data from System Management Mode of the kernel and data from virtual machines running on the host system.




Even though the three Foreshadow vulnerabilities have not been detected in the wild in relation to any malware, researchers have managed to find a method via which they can conduct an attack that can function properly. So far, Intel have not released infromation on how this information can be used to conduct an attack and for good reason.

The only information disclosed is the affected device models which have been reported to be the following:

  • All SGX-enabled processors (Skylake and Kaby Lake)
  • Intel Core™ i3/i5/i7/M processor (45nm and 32nm)
  • 2nd/3rd/4th/5th/6th/7th/8th generation Intel Core processors
  • Intel Core X-series Processor Family for Intel X99 and X299 platforms
  • Intel Xeon processor 3400/3600/5500/5600/6500/7500 series
  • Intel Xeon Processor E3 v1/v2/v3/v4/v5/v6 Family
  • Intel® Xeon® Processor E5 v1/v2/v3/v4 Family
  • Intel® Xeon® Processor E7 v1/v2/v3/v4 Family
  • Intel® Xeon® Processor Scalable Family
  • Intel® Xeon® Processor D (1500, 2100)

More in-depth information on the Foreshadow vulnerabilities can be found in the related story below:

Related: Intel Processors Affected with Foreshadow Speculative Execution Flaws

So How to Protect Oneself from Foreshadow?

If your PC is running with an Intel chip from the list above, you should know that it is potentially vulnerable to this flaw. Fortunately, Intel has created micro-patches on a micro-code type of update in order to fix these vulnerabilities. If you want to protect yourself effectively against it, you can download a new firmware for your computer model, in case such is available. This can happen if you download the latest UEFI and BIOS Intel Updates or install microcode updates, downloaded directly from Microsoft themselves. This can happen either if you look up your computer model and see on It’s vendor if an official update is available or by checking your processor model as well. Another way to do it is by visiting Microsoft’s website for the updates.

Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...