Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-24495

Опубликовано: 13 мая 2025
Источник: redhat
CVSS3: 5.6
EPSS Низкий

Описание

Incorrect initialization of resource in the branch prediction unit for some Intel(R) Core™ Ultra Processors may allow an authenticated user to potentially enable information disclosure via local access.

A flaw was found in the Branch Prediction Unit (BPU) of Intel's Lion Core CPUs that make it possible for an attacker to bypass Indirect Branch Predictor Barrier (IBPB) protections. By employing branch predictor training techniques as described in the "Training Solo" publication, an attacker with local privileges could use this bypass to exfiltrate sensitive data from an affected system, including from host hypervisors or neighboring guests in virtualized environments.

Отчет

This vulnerability was disclosed as part of the "Training Solo" report. Training Solo is a technique similar to Spectre-v2 which bypasses extant protections like IBPB or IBRS. While the technique primarily bypasses those protections by performing branch predictor training in a privileged domain, CVE-2025-24495 specifically relates to a hardware flaw in Intel's Lion Core CPUs. Intel has released a microcode update to address this flaw.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability. As this is a bypass of previous mitigations for existing hardware flaws, we do not expect that mitigations specifically for this issue will be available.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10microcode_ctlNot affected
Red Hat Enterprise Linux 6microcode_ctlFix deferred
Red Hat Enterprise Linux 7.7 Advanced Update Supportmicrocode_ctlFixedRHSA-2025:1011101.07.2025
Red Hat Enterprise Linux 7 Extended Lifecycle Supportmicrocode_ctlFixedRHSA-2025:1010801.07.2025
Red Hat Enterprise Linux 8microcode_ctlFixedRHSA-2025:1099114.07.2025
Red Hat Enterprise Linux 8.2 Advanced Update Supportmicrocode_ctlFixedRHSA-2025:1012601.07.2025
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Supportmicrocode_ctlFixedRHSA-2025:1010701.07.2025
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Supportmicrocode_ctlFixedRHSA-2025:1010901.07.2025
Red Hat Enterprise Linux 8.6 Telecommunications Update Servicemicrocode_ctlFixedRHSA-2025:1010901.07.2025
Red Hat Enterprise Linux 8.6 Update Services for SAP Solutionsmicrocode_ctlFixedRHSA-2025:1010901.07.2025

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-1419
https://bugzilla.redhat.com/show_bug.cgi?id=2366089microcode_ctl: From CVEorg collector

EPSS

Процентиль: 2%
0.00016
Низкий

5.6 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.6
ubuntu
3 месяца назад

Incorrect initialization of resource in the branch prediction unit for some Intel(R) Core™ Ultra Processors may allow an authenticated user to potentially enable information disclosure via local access.

CVSS3: 5.6
nvd
3 месяца назад

Incorrect initialization of resource in the branch prediction unit for some Intel(R) Core™ Ultra Processors may allow an authenticated user to potentially enable information disclosure via local access.

CVSS3: 5.6
debian
3 месяца назад

Incorrect initialization of resource in the branch prediction unit for ...

CVSS3: 5.6
github
3 месяца назад

Incorrect initialization of resource in the branch prediction unit for some Intel(R) Core™ Ultra Processors may allow an authenticated user to potentially enable information disclosure via local access.

CVSS3: 5.6
fstec
3 месяца назад

Уязвимость модуля Branch Prediction Unit (BPU) микропрограммного обеспечения процессоров Intel Core Ultra, позволяющая нарушителю раскрыть защищаемую информацию

EPSS

Процентиль: 2%
0.00016
Низкий

5.6 Medium

CVSS3