In June 2019, researchers from the University of Michigan, Graz University of Technology in Austria, and the University of Adelaide in Australia published details and a proof of concept exploit they called "RAMBleed" (CVE-2019-0174).
Systems using DRAM modules mitigated against Rowhammer-style attacks remain protected from RAMBleed. Additionally, the researchers note that memory encryption, including Intel® Software Guard Extensions (Intel® SGX), can be used to protect systems from RAMBleed attacks.
Protecting our customers and their data continues to be a critical priority for Intel, and we appreciate the efforts of the security community for their ongoing research.
Software Security Guidance Home | Advisory Guidance | Technical Documentation | Best Practices | Resources