Featured Post

Best places to buy Kaspersky Anti-Virus in 2020 - Android Central

Image
Best places to buy Kaspersky Anti-Virus in 2020 - Android CentralBest places to buy Kaspersky Anti-Virus in 2020 - Android CentralAntivirus Software Market Pin-Point Analyses of Industry Competition Dynamics to Offer You a Competitive Edge - 3rd Watch NewsAntivirus Software Market Research with Covid-19 after Effects - Apsters NewsAntivirus Software Market Scope by Trends, Opportunities to Expand Significantly by 2026 - Jewish Life NewsBest places to buy Kaspersky Anti-Virus in 2020 - Android CentralPosted: 28 Apr 2020 12:00 AM PDTKaspersky Anti-Virus is one of the best computer protection programs around, and has been thoroughly tested by several third-party labs and in our own in-house tests, too. The best place to purchase a copy of Kaspersky Anti-Virus is from Kaspersky itself. However, you can often find deals through other vendors. The trick is finding a trustworthy one, so you don't accidentally purchase and download malware instead of a legitimate copy of Kaspersky. Here a…

SWAPGS Vulnerability in Modern CPUs Fixed in Windows, Linux, ChromeOS - BleepingComputer

SWAPGS Vulnerability in Modern CPUs Fixed in Windows, Linux, ChromeOS - BleepingComputer


SWAPGS Vulnerability in Modern CPUs Fixed in Windows, Linux, ChromeOS - BleepingComputer

Posted: 06 Aug 2019 12:00 AM PDT

Intel

At BlackHat today, Bitdefender disclosed a new variant of the Spectre 1 speculative execution side channel vulnerabilities that could allow a malicious program to access and read the contents of privileged memory in an operating system.

This SWAPGS vulnerability allows local programs, like malware, to read data from memory that is should normally not have access to, such as the Windows or Linux kernel memory.

Andrei Vlad Lutas of Bitdefender discovered this vulnerability while performing research on CPU internals and reported it to Intel in August 2018.

In a statement from Intel, BleepingComputer was told that after the vulnerability was disclosed to them, they descided to address this on a software level and Microsoft took over coordination of the vulnerability.

"Intel, along with industry partners, determined the issue was better addressed at the software level and connected the researchers to Microsoft. It takes the ecosystem working together to collectively keep products and data more secure and this issue is being coordinated by Microsoft."

From that point forward, Microsoft took over notifying other vendors, making sure patches were released, and planning the coordinated disclosure today at BlackHat.

The SWAPGS Vulnerability

The SWAPGS vulnerability is a speculative execution side-channel vulnerability that allows bad actors to read data from privileged memory.

In order to increase performance in CPUs, a feature called speculative execution will execute instructions before it knows if they are needed or not. Vulnerabilities that target this feature are called side-channel attacks.

In a new side-channel attack discovered by Bitdefender, attackers "break the memory isolation provided by the CPU, allowing an unprivileged attacker to access privileged, kernel memory."

This is done through the SWAPGS instruction found in 64-bit CPUs that when manipulated successfully can be used to leak sensitive information from kernel memory even when the malicious process is running with low user permissions.

This could allow attackers to steal any type of information that is stored in the memory, including chat messages, emails, login credentials, payment information, passwords, encryption keys, tokens, or access credentials.

What it comes down to, is that no information can be kept secret.

While Microsoft, Intel, and Red Hat all state that this vulnerability exists in all modern CPUs, Bitdefender says they have only been able to successfully exploit the vulnerability on Intel CPUs.

"We tested two AMD CPUs: AMD64 Family 16 Model 2 Stepping 3 AuthenticAMD ~3211 Mhz and AMD64 Family 15 Model 6 Stepping 1 AuthenticAMD ~2100 Mhz and neither exhibited speculative behavior for the SWAPGS instruction.

Since the SWAPGS instruction is present only on x86-64, we don't expect other CPU architectures, such as ARM, MIPS, POWER, SPARC or RISC-V to be vulnerable. However, we don't exclude the existence of other similarly sensitive instructions that may execute speculatively."

Furthermore, as the required WRGSBASE instruction is only present in CPUs starting with Ivy Bridge, Bitdefender expects older CPUS "to be much more difficult, if not impossible to exploit."

For more detailed information about the SWAPGS vulnerability, you can visit Bitdefender's dedicated SWAPGS page. You can also watch this video shared by Bitdefender on how to protect yourself from SWAPGS attacks.

Vendors respond to SWAPGS vulnerability

In a coordinated disclosure, numerous vendors including Microsoft, Red Hat, Intel, and Google have released advisories regarding this vulnerability.

Below we have a provided more information on the advisories and updates released by vendors to mitigate this issue.

Microsoft secretly fixes vulnerability in July updates

During the July 2019 Patch Tuesday security updates, Microsoft secretly patched the new SWAPGS speculative vulnerability using software mitigations. If you install Windows security updates as they come out, then you are already protected from this vulnerability in Windows.

Microsoft's advisory that was released today is titled "Windows Kernel Information Disclosure Vulnerability" and was held back on being released until today as part of a coordinated industry disclosure.

According to Microsoft, Andrei Vlad Lutas of Bitdefender discovered this new vulnerability in some modern CPUs that would allow malicious user mode programs to access and read the contents of the Windows Kernel memory.

"To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application," Microsoft explained in their advisory. "The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further."

To resolve this vulnerability, a Windows security update was released on July 9th, 2019, that fixes the vulnerability through software changes that mitigate how a CPU speculatively accesses memory. Microsoft further stated that it is not required to install a microcode update to resolve this vulnerability.

"Customers who have Windows Update enabled and have applied the security updates released on July 9, 2019 are protected automatically. There is no further configuration necessary."

It is not known if these software changes will have any effect on Windows performance like previous mitigations.

Microsoft has shared the following statement with BleepingComputer regarding this vulnerability:

"We're aware of this industry-wide issue and have been working closely with affected chip manufacturers and industry partners to develop and test mitigations to protect our customers. We released security updates in July and customers who have Windows Update enabled and applied the security updates are protected automatically."

Red Hat releases updated kernels

Red Hat has also released an advisory regarding this latest Spectre variant titled "CVE-2019-1125: Spectre SWAPGS gadget vulnerability".

Red Hat users can fix this vulnerability by updating the kernel and installing the latest microcode updates.

"Red Hat has been made aware of an additional spectre-V1 like attack vector, requiring updates to the Linux kernel in combination with microcode updates. This additional attack vector builds on existing software fixes shipped in previous kernel and microcode updates. This vulnerability only applies to x86-64 systems using either Intel or AMD processors."

Intel releases advisory

Intel has released an advisory regarding the SWAPGS vulnerability. This basically rehashes what other vendors have stated.

After assessing this issue with industry partners, we determined that the best mitigation would be at the software layer. Microsoft agreed to coordinate remediation efforts, working with the researchers and other industry partners. Microsoft released their software update to address this issue in July 2019 and today published their security advisory as part of the CVD process. 

Some Linux* OS vendors may elect to release updates for their products. Please check with your Linux OS vendor for details.

Google adds SWAPGS fix to ChromeOS 4.19 and Android 4.19

Google has added fixes for this vulnerability to ChromeOS 4.19, which is expected to be released soon.

Gustavo A. R. Silva (1):        IB/hfi1: Fix Spectre v1 vulnerability    Josh Poimboeuf (7):        x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations        x86/speculation: Enable Spectre v1 swapgs mitigations        x86/entry/64: Use JMP instead of JMPQ        Documentation: Add swapgs description to the Spectre v1 documentation

In a bug report found by BleepingComputer, Google has merged SWAPGS patches into ChromeOS 4.19 and updated their Spectre admin-guide to include information about this vulnerability.

"An attacker can train the branch predictor to speculatively skip the swapgs path for an interrupt or exception. If they initialize the GS register to a user-space value, if the swapgs is speculatively skipped, subsequent GS-related percpu accesses in the speculation window will be done with the attacker-controlled GS value. This could cause privileged memory to be accessed and leaked."

This same fix was also added to Android 4.19 per a commit found by BleepingComputer on the Android Gerrit.

x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations  x86/speculation: Enable Spectre v1 swapgs mitigations  x86/entry/64: Use JMP instead of JMPQ  x86/speculation/swapgs: Exclude ATOMs from speculation through SWAPGS  Documentation: Add swapgs description to the Spectre v1 documentation

AMD believes they are not affected

In a updated on the AMD Product Security page, AMD states that they do not believe they are affected.

"AMD is aware of new research claiming new speculative execution attacks that may allow access to privileged kernel data. Based on external and internal analysis, AMD believes it is not vulnerable to the SWAPGS variant attacks because AMD products are designed not to speculate on the new GS value following a speculative SWAPGS. For the attack that is not a SWAPGS variant, the mitigation is to implement our existing recommendations for Spectre variant 1."

Linux kernel patched

A patch for the Linux kernel for the SWAPGS vulnerability has also been shared by Red Hat engineer Josh Poimboeuf.

"Spectre v1 isn't only about array bounds checks. It can affect any conditional checks. The kernel entry code interrupt, exception, and NMI handlers all have conditional swapgs checks. Those may be problematic in the context of Spectre v1, as kernel code can speculatively run with a user GS."

As more vendors release advisories, we will update this story.

Bitdefender Integrates MSP Security Suite With Datto RMM - PRNewswire

Posted: 12 Dec 2019 12:00 AM PST

BUCHAREST, Romania and SANTA CLARA, California, Dec. 12, 2019 /PRNewswire/ -- Bitdefender, a global cybersecurity leader protecting over 500 million systems in 150 countries, today announced the integration of Bitdefender's GravityZone MSP security suite with Datto RMM, an intuitive and scalable cloud remote monitoring and management solution for Managed Service Providers.

This integration, available now, lets MSPs using Datto RMM to automate and accelerate installation of Bitdefender AV, antimalware and advanced endpoint layers through a unified OS-agnostic kit.

With minimal configuration effort, MSPs can install on customers' devices essential security layers such as antimalware, content control, email security and patch management, as well as advanced technologies such as tunable machine learning, sandbox and EDR. Bitdefender's comprehensive layered security lets MSPs prevent, detect and respond to new types of ransomware, unknown threats,  fileless attacks, and even stop targeted attacks.

The new integration between Datto RMM and Bitdefender enables MSPs to autodetect the OS type, whether Windows, Mac or Linux, then to automatically deploy the Bitdefender agent from a single component. It also allows them to monitor the installation status and update status.

"Our MSP partners told us they need a reliable, proven security solution that matches their business model and integrates with their daily routines and workflows," said Alina Draganescu, Senior Director of Security for MSPs and SMBs for Bitdefender. "So we built the integration with Datto RMM which uses a unified, agnostic installation kit that works across multiple operating systems. Saving time through automatic deployment and relying on the software to do the work for you is important when you have diverse infrastructures with systems running on Windows, Linux or Mac."

"With this integration, our MSP partners using Datto RMM are now able to quickly deploy the Bitdefender Cloud Security agent and view the security status of an endpoint from within their Datto RMM interface, eliminating the need to transition from platform to platform," said Aaron Dun, VP of product and growth marketing at Datto. "We're dedicated to ensuring our MSP partners have seamless integrations with the products they use every day to create efficiencies, and we welcome Bitdefender to our Datto Developer Program."

Key benefits of integration for MSPs using Bitdefender and Datto RMM:

     Simplified and automated deployment: Automatically install Bitdefender protection on new endpoints managed by Datto RMM.

     Streamlined installation and configuration: A single Bitdefender component autodetects the OS, and installs on Windows, Mac, Linux with minimum configuration needed.

     Support for advanced security layers: MSPs can deploy a comprehensive set of security layers, including tunable machine learning, Sandbox, and EDR.

     Easy-to-use proven Bitdefender protection: It's now easier for MSPs to protect customers against new ransomware and advanced attacks with Bitdefender security, which consistently leads independent tests for protection.

The new integration between Datto and Bitdefender enables MSPs to first autodetect the OS type Windows, Mac and Linux and then to automate deployment of Bitdefender agent from one single component. It also allows them to monitor installation status and update status.

For more information visit https://www.datto.com/integrations/bitdefender.

About Bitdefender

Bitdefender is a global cybersecurity leader protecting over 500 million systems in more than 150 countries. Since 2001, Bitdefender innovation has consistently delivered award-winning security products and threat intelligence for people, homes, businesses and their devices, networks and cloud services. Today, Bitdefender is also the provider-of-choice, used in over 38% of the world's security solutions. Recognized by industry, respected by vendors and evangelized by our customers, Bitdefender is the cybersecurity company you can rely on. www.bitdefender.com

SOURCE Bitdefender

Related Links

http://www.bitdefender.com

Comments

Popular Posts

System detected an overrun of a stack-based buffer in this application [FIX] - Windows Report

Valorant anti-cheat lead answers many questions on Reddit - Millenium US