Advertisement

Researchers determine old vulnerabilities pose real-world threat to sensitive data in public clouds

The presentation Monday revises the old Spectre vulnerability in a new scenario, demonstrating there’s not enough focus on the danger.
Listen to this article
0:00
Learn more. This feature uses an automated voice, which may result in occasional errors in pronunciation, tone, or sentiment.
BlackJack3D, iStock/Getty Images Plus

Using a seven-year-old vulnerability, researchers said they were able to realistically leak private data from public clouds, suggesting that a “lack of concern” about such supposedly impractical attacks is misguided, according to a presentation delivered Monday.

The anonymous researchers presented their findings at a hacker conference, WHY2025, in the Netherlands, and they leaned on the kind of “transient execution” vulnerabilities that attracted attention in 2018 with high-profile Intel chip flaw revelations, one of which was known as Spectre.

“Given that today’s clouds have large fleets of older CPUs that lack comprehensive, in-silicon fixes to a variety of transient execution vulnerabilities, the question arises whether sufficient software-based defenses have been deployed to stop realistic attacks — especially those using older, supposedly mitigated vulnerabilities,” they wrote. The answer to that question is “no,” they concluded. “We show that the practice of mitigating vulnerabilities in isolation, without removing the root cause, leaves systems vulnerable.”

The findings demonstrate that “more than a theoretical possibility, this is a real-world threat in popular clouds,” they explained, unlike the Spectre vulnerability that hasn’t had much real-world applicability. 

Advertisement

“For regular users, these CPU vulnerabilities are likely not that much of a threat,” the researchers said. “However, that is not the case for public cloud providers. Their business model is to provide remote code execution as a service [emphasis theirs], and to rent out shared hardware resources as efficiently as possible.”

The researchers said they worked within dedicated host systems of Google Cloud and Amazon Web Services to avoid any actual harm. AWS was able to restrict leakage to non-sensitive host data. Google paid a more than $150,000 bounty, the highest its cloud vulnerability reward program has ever doled out.

Both companies have patched the exploit and plan future security steps.

“Our conclusion is not that AWS’s and Google’s security was lacking, but that they are actively stimulating security improvements,” the researchers said.

The researchers dubbed the attack “L1TF Reloaded,” after another 2018 Intel chip data-stealing vulnerability.

Advertisement

In a blog post, Amazon — which noted that it sponsored a portion of the work — said the research was “impressive” but that the L1TF Reloaded vulnerability does not impact the guest data of AWS customers running on the AWS Nitro System or Nitro Hypervisor.

A Google spokesperson pointed to a security bulletin the company issued.

“When this vulnerability was initially discovered, Google immediately implemented mitigations to address the known risks. Since then, we have collaborated with security researchers from academia to assess the current state of CPU security mitigations, and new attack techniques,” the spokesperson said. “We applied new fixes to the affected assets, including Google Cloud, to mitigate the issue.”

While such vulnerabilities have previously caused little concern, the researchers wrote that “we question this lack of concern and show not only that practical attacks on modern clouds are possible, but that they are possible with vulnerabilities we considered mitigated 7 years ago.”

Latest Podcasts