{"vulnerability": "CVE-2020-0543", "sightings": [{"uuid": "32e28865-2056-46bc-b681-683b6edf3ecc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0543", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1245", "content": "#Research\n\"New CrossTalk attack (CVE-2020-0543) impacts Intel's mobile, desktop, and server CPUs\", 2020.\n]-&gt; https://www.vusec.net/projects/crosstalk\n]-&gt; PoC: https://github.com/vusec/ridl", "creation_timestamp": "2024-10-28T15:29:36.000000Z"}, {"uuid": "d07b903e-a415-497b-aee3-f0738c28fc48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0543", "type": "seen", "source": "https://t.me/thehackernews/726", "content": "Modern Intel processors found vulnerable to 2 new, distinct SGX side-channel attacks \u2014 \"CrossTalk\" (CVE-2020-0543) and \"SGAxe\" \u2014 that could let attackers tamper/steal sensitive data guarded within blocks of secured memory (TEE and SGX).\n\nRead more: https://thehackernews.com/2020/06/intel-sgaxe-crosstalk-attacks.html", "creation_timestamp": "2020-06-10T15:05:51.000000Z"}, {"uuid": "2a556cc5-c7b1-42aa-9492-b92d3b4c8eb3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0543", "type": "seen", "source": "https://t.me/SecLabNews/7808", "content": "\u0421\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u044b \u0410\u043c\u0441\u0442\u0435\u0440\u0434\u0430\u043c\u0441\u043a\u043e\u0433\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u0443\u043d\u0438\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442\u0430 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b\u0438 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u043e \u043d\u043e\u0432\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u0430\u0445 Intel (CVE-2020-0543). \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0430\u044f \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 CrossTalk, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043a\u043e\u0434 \u043d\u0430 \u043e\u0434\u043d\u043e\u043c \u044f\u0434\u0440\u0435 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u0430 \u0434\u043b\u044f \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u0438\u0437 \u041f\u041e, \u0437\u0430\u043f\u0443\u0449\u0435\u043d\u043d\u043e\u043c \u043d\u0430 \u0434\u0440\u0443\u0433\u043e\u043c \u044f\u0434\u0440\u0435. \u0410\u0442\u0430\u043a\u0430 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u043e\u0447\u0435\u0440\u0435\u0434\u043d\u0443\u044e \u0430\u0442\u0430\u043a\u0443 MDS (Microarchitectural Data Sampling), \u0431\u0430\u0437\u0438\u0440\u0443\u044e\u0449\u0443\u044e\u0441\u044f \u043d\u0430 \u0441\u043f\u0435\u043a\u0443\u043b\u044f\u0442\u0438\u0432\u043d\u043e\u043c \u0438\u0441\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0438 \u043a\u043e\u043c\u0430\u043d\u0434. \u041a MDS-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u043c \u0442\u0430\u043a\u0436\u0435 \u043e\u0442\u043d\u043e\u0441\u044f\u0442\u0441\u044f Meltdown \u0438 Spectre.\n\n\nIntel \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u043e\u0447\u0435\u0440\u0435\u0434\u043d\u0443\u044e MDS-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0441\u0432\u043e\u0438\u0445 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u0430\u0445", "creation_timestamp": "2020-07-20T08:49:20.000000Z"}]}