AMD processors vulnerable to two new types of side-channel attacks

Ryzen 5 3600X
Ryzen 5 3600X (Image credit: Windows Central)

What you need to know

  • Researchers discovered two new attacks that AMD processors are vulnerable to.
  • AMD processors from 2011-2019 are vulnerable to the attacks.
  • While the vulnerabilities lead to security risks, they are not as bad as well-known vulnerabilities Meltdown and Zombieland.

Researchers discovered two new vulnerabilities that can affect AMD processors from between 2011-2019. The attacks, called Collide+Probe and Load+Reload affect the security of data processed by affected AMD CPUs. As a result, attackers can steal information or affect security features. A team of six researchers from Graz University of Technology in Austria and the University of Rennes in France details their discoveries in an extensive document.

The team of researchers states that they contacted AMD regarding the issues in August of 2019, but AMD has not released firmware updates related to the issue since then. AMD states that the attacks "are not new speculation-based attacks." The research team disagrees with AMD's claim.

The attacks work by targetting the L1D cache way predictor. This feature improves the way CPUs handle cached data, which reduces power consumption. Below is a detailed explanation from the researchers' document:

The predictor computes a μTag using an undocumented hash function on the virtual address. This μTag is used to look up the L1D cache way in a prediction table. Hence, the CPU has to compare the cache tag in only oneway instead of all possible ways, reducing the power consumption.

The researchers also break down how they exploited the attacks:

In the first attack technique, Collide+Probe, we exploit μTag collisions of virtual addresses to monitor the memory accesses of a victim time-sharing the same logical core.In the second attack technique, Load+Reload, we exploit the property that a physical memory location can only reside once in the L1D cache. Thus, accessing the same location with a different virtual address evicts the location from the L1D cache. This allows an attacker to monitor memory accesses on a victim, even if the victim runs on a sibling logical core.

These attacks are potentially dangerous because they could be used in the wild. Some attacks require such high levels of access to a computer that they're not viable for most attackers. ZDNet points out that Collide+Probe and Load+Reload work without physical access, special equipment, or connections to hidden ports. The research team states that it demonstrated and evaluated the attacks "in sandboxed JavaScript and virtualized cloud environments."

AMD issued a response to the issue, in which it states, "AMD believes these are not new speculation-based attacks." AMD believes "this issue can be mitigated in software by using side-channel counter measures." The research team that discovered the attacks told ZDNet that AMD's response is "rather misleading" and added that AMD never engaged with the research team about the attacks. Additionally, the research team states that the attacks still work on full-update operating systems.

While these attacks present a security risk, Daniel Gruss, one of the researchers that discovered the attacks, stated on Twitter that they aren't as dangerous as Meltdown and Zombieload. He said in response to another Twitter user, "The attacks leak a few [bits] of meta-data. Meltdown and Zombieload leak tons of actual data."

Sean Endicott
News Writer and apps editor

Sean Endicott is a tech journalist at Windows Central, specializing in Windows, Microsoft software, AI, and PCs. He's covered major launches, from Windows 10 and 11 to the rise of AI tools like ChatGPT. Sean's journey began with the Lumia 740, leading to strong ties with app developers. Outside writing, he coaches American football, utilizing Microsoft services to manage his team. He studied broadcast journalism at Nottingham Trent University and is active on X @SeanEndicott_ and Threads @sean_endicott_. 

Latest in CPU GPU Components
NVIDIA CES 2025
You should be worried about NVIDIA’s launch strategy for its most popular GPUs. Here's why.
AMD Ryzen 5 5500
This 1080p gaming CPU is down to $76 — it doesn't get much better for budget PC builders
Gigabyte RTX 5080
NVIDIA's RTX 5080 is in stock at Newegg, but you won't like the new pricing
Crucial T500 1TB SSD with heatsink on a mechanical gaming keyboard.
I just bought this 34% off 1TB SSD for my gaming PC because it's fast, cheap, and well-rated — Now I can finally upgrade my gaming PC
Cyberpunk 2077 Ray Tracing Screenshot
"Groundbreaking performance improvements" — Microsoft introduces DirectX Raytracing 1.2
ASUS TUF Gaming RTX 3070 Ti
Hoping to land NVIDIA's RTX 5060? Rumors suggest it won't happen this month.
Latest in News
Helldivers 2
The new Helldivers 2 Illuminate Major Order is so important that we got a new stratagem for it
Hogwarts Legacy troll hero image
Hogwarts Legacy DLC reportedly canceled by WB Games
Tom Clancy's Rainbow Six Siege
Rumored Ubisoft and Tencent agreement comes to fruition with 25% stake and new division for the Assassin's Creed developer
In-game screenshot of the player consuming an enemy in Shadow Labyrinth
This isn't your grandpa's Pac-Man — Bandai Namco's iconic character gets a gritty new action game this Summer
Key art for Dragon Quest 1 and 2 HD-2D remake
Every PC and Xbox game shown off during Nintendo Direct March 2025
Excel spreadsheet with checkboxes
Microsoft 365 sales are few and far between these days — grab this one before it goes away!