New VMSCape attack breaks guest-host isolation on AMD, Intel CPUs

A new security vulnerability named VMSCape has been discovered, impacting both AMD and Intel CPUs. This attack breaks the critical guest-host isolation barrier in virtualized environments, allowing attackers to potentially escape virtual machines and access the host system. The vulnerability affects multiple CPU architectures and poses a significant risk to cloud service providers and enterprises relying on virtualization for security and resource management. The VMSCape attack exploits flaws in the CPU's handling of virtualization instructions, enabling malicious actors to execute code on the host from within a guest virtual machine. This breach undermines the foundational security assumptions of virtualization technology, which is widely used to isolate workloads and protect sensitive data. Security researchers have demonstrated the feasibility of the attack on recent AMD and Intel processors, highlighting the urgent need for patches and mitigations. Both CPU manufacturers and virtualization software vendors are working on updates to address the vulnerability. Users and administrators are advised to apply security patches promptly and monitor for unusual activity in virtualized environments. This discovery underscores the evolving threat landscape in hardware-level security and the importance of continuous vigilance and rapid response to emerging vulnerabilities. Organizations should review their virtualization security posture and consider additional layers of defense to mitigate potential exploitation of VMSCape and similar attacks.

This Cyber News was published on www.bleepingcomputer.com. Publication date: Thu, 11 Sep 2025 15:05:11 +0000


Cyber News related to New VMSCape attack breaks guest-host isolation on AMD, Intel CPUs

New VMSCape attack breaks guest-host isolation on AMD, Intel CPUs - A new security vulnerability named VMSCape has been discovered, impacting both AMD and Intel CPUs. This attack breaks the critical guest-host isolation barrier in virtualized environments, allowing attackers to potentially escape virtual machines and ...
3 months ago Bleepingcomputer.com CVE-2024-12345
Fresh SLAM Attack Extracts Sensitive Data from AMD CPUs and Upcoming Intel Processors - Academic researchers have unveiled a novel side-channel attack named SLAM, designed to exploit hardware enhancements meant to bolster security in forthcoming CPUs from major manufacturers like Intel, AMD, and Arm. The attack aims to retrieve the root ...
2 years ago Cysecurity.news
Intel out-of-band patch addresses privilege escalation flaw The Register - Intel on Tuesday issued an out-of-band security update to address a privilege escalation vulnerability in recent server and personal computer chips. The flaw, designated INTEL-SA-00950 and given a CVSS 3.0 score of 8.8 out of 10, affects Intel ...
2 years ago Theregister.com
New SLAM attack steals sensitive data from AMD, future Intel CPUs - Academic researchers developed a new side-channel attack called SLAM that exploits hardware features designed to improve security in upcoming CPUs from Intel, AMD, and Arm to obtain the root password hash from the kernel memory. SLAM is a transient ...
2 years ago Bleepingcomputer.com
Intel knew AVX chips were insecure and did nothing - Intel has been sued by a handful of PC buyers who claim the x86 goliath failed to act when informed five years ago about faulty chip instructions that allowed the recent Downfall vulnerability, and during that period sold billions of insecure chips. ...
2 years ago Theregister.com
SLAM Attack: New Vulnerability Targets Intel, AMD, Arm CPUs - In a groundbreaking revelation, researchers from Vrije Universiteit Amsterdam have uncovered a formidable side-channel attack known as SLAM, posing a serious threat to the security of current and future CPUs manufactured by tech giants Intel, AMD, ...
1 year ago Securityboulevard.com
Microsoft December 2023 Patch Tuesday fixes 34 flaws, 1 zero-day - Today is Microsoft's December 2023 Patch Tuesday, which includes security updates for a total of 34 flaws and one previously disclosed, unpatched vulnerability in AMD CPUs. While eight remote code execution bugs were fixed, Microsoft only rated three ...
2 years ago Bleepingcomputer.com CVE-2023-20588
CVE-2025-37936 - In the Linux kernel, the following vulnerability has been resolved: ...
7 months ago
CVE-2025-21839 - In the Linux kernel, the following vulnerability has been resolved: ...
9 months ago
CVE-2022-37327 - Improper input validation in BIOS firmware for Intel(R) NUC, Intel(R) NUC Performance Kit, Intel(R) NUC Performance Mini PC, Intel(R) NUC 8 Compute Element, Intel(R) NUC Pro Kit, Intel(R) NUC Pro Board, Intel(R) NUC 11 Compute Element, Intel(R) NUC ...
2 years ago
Israel $3.2bn Grant For Intel's $25 Billion Chip Factory - Intel to make its largest ever single investment in Israel, with a $25 billion chip-making factory in the south of the country. Intel and the Israeli government have confirmed plans to construct a $25 billion chip-making factory in Southern Israel. ...
1 year ago Silicon.co.uk
CVE-2024-53135 - In the Linux kernel, the following vulnerability has been resolved: KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN Hide KVM's pt_mode module param behind CONFIG_BROKEN, i.e. disable support for virtualizing Intel PT via ...
1 year ago Tenable.com
AMD CPU Signature Verification Vulnerability Let Attackers Load Malicious Microcode - However, the fact that Google’s researchers were able to successfully bypass AMD’s microcode signature verification highlights a potential weakness in the security architecture of modern processors that could have significant implications ...
8 months ago Cybersecuritynews.com CVE-2024-36347
Chipmaker Patch Tuesday: Intel, AMD Address New Microarchitectural Vulnerabilities - Chipmakers Intel and AMD have published 10 new security advisories this Patch Tuesday to inform customers about vulnerabilities impacting their products. Intel published eight new advisories, including two that describe high-severity vulnerabilities. ...
1 year ago Securityweek.com CVE-2023-28746
CVE-2025-40300 - In the Linux kernel, the following vulnerability has been resolved: ...
3 months ago
Latest Intel CPUs impacted by new Indirector side-channel attack - Modern Intel processors, including chips from the Raptor Lake and the Alder Lake generations are susceptible to a new type of a high-precision Branch Target Injection attack dubbed 'Indirector,' which could be used to steal sensitive information from ...
1 year ago Bleepingcomputer.com
Latest Intel CPUs impacted by new Indirector side-channel attack - Modern Intel processors, including chips from the Raptor Lake and the Alder Lake generations are susceptible to a new type of a high-precision Branch Target Injection attack dubbed 'Indirector,' which could be used to steal sensitive information from ...
1 year ago Bleepingcomputer.com
Linux 6.15-rc1 Released With Major Driver Update & Perfomance Boost - The release represents a substantial update, with approximately two-thirds of the patch series dedicated to driver enhancements, while the remaining portion addresses architecture updates, file systems, scheduling, memory management, and networking ...
8 months ago Cybersecuritynews.com
CVE-2019-19577 - An issue was discovered in Xen through 4.12.x allowing x86 AMD HVM guest OS users to cause a denial of service or possibly gain privileges by triggering data-structure access during pagetable-height updates. When running on AMD systems with an IOMMU, ...
5 years ago
CVE-2020-29483 - An issue was discovered in Xen through 4.14.x. Xenstored and guests communicate via a shared memory page using a specific protocol. When a guest violates this protocol, xenstored will drop the connection to that guest. Unfortunately, this is done by ...
4 years ago
Attack Vector vs Attack Surface: The Subtle Difference - Cybersecurity discussions about "Attack vectors" and "Attack surfaces" sometimes use these two terms interchangeably. This article guides you through the distinctions between attack vectors and attack surfaces to help you better understand the two ...
2 years ago Trendmicro.com
CVE-2020-15567 - An issue was discovered in Xen through 4.13.x, allowing Intel guest OS users to gain privileges or cause a denial of service because of non-atomic modification of a live EPT PTE. When mapping guest EPT (nested paging) tables, Xen would in some ...
3 years ago
AMD Microcode Signature Verification Vulnerability Let Attackers Load Malicious Patches - Security researchers have uncovered a critical vulnerability in AMD Zen CPUs that allows attackers with elevated privileges to load malicious microcode patches, bypassing cryptographic signature checks. Dubbed “EntrySign,” this flaw stems ...
9 months ago Cybersecuritynews.com
Intel Discloses Max Severity Bug in Its AI Model Compression Software - Intel has disclosed a maximum severity vulnerability in some versions of its Intel Neural Compressor software for AI model compression. The bug, designated as CVE-2024-22476, provides an unauthenticated attacker with a way to execute arbitrary code ...
1 year ago Darkreading.com CVE-2024-22476
CVE-2024-36877 - Micro-Star International Z-series motherboards (Z590, Z490, and Z790) and B-series motherboards (B760, B560, B660, and B460) with firmware 7D25v14, 7D25v17 to 7D25v19, and 7D25v1A to 7D25v1H was discovered to contain a write-what-where condition in ...
1 year ago