Researchers find way to hack your CPU via AMD and Intel's frequency boosts
"We do not believe this attack to be practical outside of a lab environment," says Intel.
Keep up to date with the most important stories and the best deals, as picked by the PC Gamer team.
You are now subscribed
Your newsletter sign-up was successful
Want to add more newsletters?
Every Friday
GamesRadar+
Your weekly update on everything you could ever want to know about the games you already love, games we know you're going to love in the near future, and tales from the communities that surround them.
Every Thursday
GTA 6 O'clock
Our special GTA 6 newsletter, with breaking news, insider info, and rumor analysis from the award-winning GTA 6 O'clock experts.
Every Friday
Knowledge
From the creators of Edge: A weekly videogame industry newsletter with analysis from expert writers, guidance from professionals, and insight into what's on the horizon.
Every Thursday
The Setup
Hardware nerds unite, sign up to our free tech newsletter for a weekly digest of the hottest new tech, the latest gadgets on the test bench, and much more.
Every Wednesday
Switch 2 Spotlight
Sign up to our new Switch 2 newsletter, where we bring you the latest talking points on Nintendo's new console each week, bring you up to date on the news, and recommend what games to play.
Every Saturday
The Watchlist
Subscribe for a weekly digest of the movie and TV news that matters, direct to your inbox. From first-look trailers, interviews, reviews and explainers, we've got you covered.
Once a month
SFX
Get sneak previews, exclusive competitions and details of special events each month!
A new family of side-channel CPU exploits have been discovered. Researchers are calling it Hertzbleed, and theoretically it could affect anyone, though mostly it's cryptography engineers that need to be alert.
There's actually been some debate from Intel over whether it's a practical threat to most people. For that reason, the company has decided not to patch it, despite having requested a longer embargo before the research was to be published.
We've covered side-channel attacks before, such as Spectre and Meltdown CPU exploits, but this one is a whole new kettle of fish (via IFL Science).
The research paper (PDF warning) goes through their process of exposing the vulnerability. It shows that power side-channel attacks can be turned into timing attacks, meaning hackers can analyse the time your CPU takes to execute cryptographic algorithms and use that against you.
Since dynamic frequency scaling in a CPU depends on the data being processed, it's possible to use the frequency variations in modern Intel and AMD x86 CPUs to leak full cryptographic keys via remote timing. Essentially, the signatures left by the CPU's frequency clock can give it away. The fact this could even be executed remotely was a big worry for the researchers.
The accompanying report states up front that "In the worst case, these attacks can allow an attacker to extract cryptographic keys from remote servers that were previously believed to be secure."
Having been informed of the potential dangers—which the researchers note "are significant"—Intel said that "While this issue is interesting from a research perspective, we do not believe this attack to be practical outside of a lab environment." That's according to Intel Senior Director of Security Communications and Incident Response, Jerry Bryant, and it's the main reason the company does not plan to patch it.
Keep up to date with the most important stories and the best deals, as picked by the PC Gamer team.
The research itself backs this up in that, "Despite its theoretical power, it is not obvious how to construct practical exploits through the frequency side channel."
We asked Intel why it asked for a longer embargo before the research was published, despite the lack of plans to push a patch out, and were directed to a recent post containing guidance on how to mitigate the side-channel attacks.
Best CPU for gaming: The top chips from Intel and AMD
Best gaming motherboard: The right boards
Best graphics card: Your perfect pixel-pusher awaits
Best SSD for gaming: Get into the game ahead of the rest
Intel recently sat down with the researchers to hash out the issue, and when asked if disabling Turbo Boost might help, the company notes "The throttling side-channel is caused by throttling when system power/current hits certain reactive limit, regardless of whether turbo boost is enabled or not."
Back in 2020, Intel decided it would improve its CPU security to protect against side-channel attacks, but new techniques for decrypting personal data are getting more extravagant by the day. That's why it's important for large companies like this to take notice of researchers, and to find ways to mitigate attacks before they can occur.
Intel also shared its findings with other silicon vendors, presumably AMD and the like, so others could get a handle on it, too.

Having been obsessed with game mechanics, computers and graphics for three decades, Katie took Game Art and Design up to Masters level at uni and has been writing about digital games, tabletop games and gaming technology for over five years since. She can be found facilitating board game design workshops and optimising everything in her path.

