Cloud Server Vulnerability Detected in Latest AMD and Intel Chips

By Sunil Sonkar
2 Min Read
Cloud Server Vulnerability Detected in Latest AMD and Intel Chips

ETH Zurich computer scientists have lately uncovered a security issue in the newest AMD and Intel chips. It is claimed to be affecting major cloud service providers as the chips are widely being used in public cloud services.


The latest vulnerability may impact confidential computing technologies which are designed to protect sensitive data during processing in shared cloud resources. The approach mainly isolates data in a secure area and safeguards it from other users as well as the cloud provider. Researchers state that the hackers can now easily exploit the system to access data.

The vulnerability is basically revolving around the interrupt mechanism of the cloud service system. This means it can temporarily disrupt regular processing. It is found that 256 different interrupts are triggering specific commands and hackers may gain unauthorized access to servers using AMD and Intel chips.

ETH Zurich Professor of Computer Science Shweta Shinde and identified the vulnerabilities with the help of her team. The research is learned to be presented at the IEEE Symposium on Security and Privacy and the USENIX Security Symposium in 2024.

The team discovered security issue while studying confidential computing technologies used in AMD and Intel processors. They are currently developing an eavesdrop-proof smartphone based on confidential computing principles.

Confidential computing relies on a trusted execution environment (TEE). It isolates applications during runtime. The process protects data from unauthorized access even when it is stored in memory.

The vulnerability affects cloud resources management. Hackers can easily get access to data from other users sharing the same hardware. However, the new finding highlights importance of securing cloud systems and simultaneously protecting our sensitive data from unauthorized access.

Share This Article
Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *