{"id":17718,"date":"2018-11-02T12:19:13","date_gmt":"2018-11-02T12:19:13","guid":{"rendered":"http:\/\/901cb10d-88ce-4a0b-b1ed-15de27846da2"},"modified":"2018-11-02T12:19:13","modified_gmt":"2018-11-02T12:19:13","slug":"intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability\/","title":{"rendered":"Intel CPUs impacted by new PortSmash side-channel vulnerability"},"content":{"rendered":"<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2018\/11\/02\/8cf2639a-0fa2-43b4-8a8b-3b57baf92ad3\/2051e6caa3f0f852d6aec3cfc5170195\/portsmash.png\" class=\"\" alt=\"portsmash.png\"\/><\/span><\/p>\n<p>Intel processors are impacted by a new vulnerability that can allow attackers to leak encrypted data from the CPU&#8217;s internal processes.<\/p>\n<p>The new vulnerability, which has received the codename of PortSmash, has been discovered by a team of five academics from the Tampere University of Technology in Finland and Technical University of Havana, Cuba.<\/p>\n<p>Researchers have classified PortSmash as a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Side-channel_attack\" target=\"_blank\" rel=\"noopener noreferrer\">side-channel attack<\/a>. In computer security terms, a side-channel attack describes a technique used for leaking encrypted data from a computer&#8217;s memory or CPU, which works by recording and analyzing discrepancies in operation times, power consumption, electromagnetic leaks, or even sound to gain additional info that may help break encryption algorithms and recovering the CPU&#8217;s processed data.<\/p>\n<div class=\"relatedContent alignRight\">\n<h3 class=\"heading\"><span class=\"int\">More security news<\/span><\/h3>\n<\/div>\n<p>Researchers say PortSmash impacts all CPUs that use a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Simultaneous_multithreading\" target=\"_blank\" rel=\"noopener noreferrer\">Simultaneous Multithreading (SMT)<\/a> architecture, a technology that allows multiple computing threads to be executed simultaneously on a CPU core.<\/p>\n<p>In lay terms, the attack works by running a malicious process next to legitimate ones using SMT&#8217;s parallel thread running capabilities. The malicious PortSmash process than leaks small amounts of data from the legitimate process, helping an attacker reconstruct the encrypted data processed inside the legitimate process.<\/p>\n<p>Researchers say they&#8217;ve already confirmed that PortSmash impacts Intel CPUs which support the company&#8217;s Hyper-Threading (HT) technology, Intel&#8217;s proprietary implementation of SMT.<\/p>\n<p>&#8220;Our attack has nothing to do with the memory subsystem or caching,&#8221; said Billy Brumley, one of the five researchers, referring to previous side-channel attacks that have impacted SMT architectures and Intel&#8217;s HT implementation.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>&#8220;The nature of the leakage is due to execution engine sharing on SMT (e.g. Hyper-Threading) architectures. More specifically, we detect <a href=\"https:\/\/dendibakh.github.io\/blog\/2018\/03\/21\/port-contention\" target=\"_blank\" rel=\"noopener noreferrer\">port contention<\/a> to construct a timing side-channel to exfiltrate information from processes running in parallel on the same physical core,&#8221; Brumley added.<\/p>\n<p>A research paper detailing the PortSmash vulnerability in more depth for astute technical readers will be published on the <a href=\"https:\/\/eprint.iacr.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cryptology ePrint Archive portal<\/a> in the coming days, Brumley told <em>ZDNet<\/em> earlier today via email when we reached out for more details.<\/p>\n<h3>PoC available<\/h3>\n<p>His team also published proof-of-concept (PoC) code <a href=\"https:\/\/github.com\/bbbrumley\/portsmash\" target=\"_blank\" rel=\"noopener noreferrer\">on GitHub<\/a> that demonstrates a PortSmash attack on Intel Skylake and Kaby Lake CPUs.<\/p>\n<p>The PoC steals an OpenSSL (&lt;= 1.1.0h) P-384 private key from a TLS server by successfully exploiting PortSmash, but the attack can be modified to target any type of data.<\/p>\n<p>The PortSmash PoC also requires malicious code to be running on the same physical core as the victim, but this isn&#8217;t such a big hurdle for attackers.<\/p>\n<p>&#8220;IaaS [<a href=\"https:\/\/en.wikipedia.org\/wiki\/Infrastructure_as_a_service\" target=\"_blank\" rel=\"noopener noreferrer\">Infrastructure-as-a-Service<\/a>] is one scenario to make it more &#8216;remote&#8217;,&#8221; Brumley told <em>ZDNet<\/em>. &#8220;There, attackers would try to co-locate VMs with victims to end up running the exploit on the same physical core as the victim, but different logical core.&#8221;<\/p>\n<p>&#8220;[PortSmash] definitely does not need root privileges,&#8221; he said &#8220;Just user space.&#8221;<\/p>\n<p>Researchers say they notified Intel&#8217;s security team last month, on October 1, but the company has not provided a patch until yesterday, the date on which researchers went public with their findings. An Intel spokesperson was not available for comment regarding the state of the PortSmash patching process before this article&#8217;s publication.<\/p>\n<h3>AMD CPUs likely impacted<\/h3>\n<p>&#8220;We leave as future work exploring the capabilities of PortSmash on other architectures featuring SMT, especially on AMD Ryzen systems,&#8221; the research team said in a version of their paper shared with <em>ZDNet<\/em>, but Brumley told us via email that he strongly suspects that AMD CPUs are also impacted.<\/p>\n<p>The work behind discovering PortSmash is also the first result of &#8220;<a href=\"https:\/\/pervasive.cs.tut.fi\/?p=2747\" target=\"_blank\" rel=\"noopener noreferrer\">SCARE: Side-Channel Aware Engineering<\/a>,&#8221; a five-year security research project funded by the European Research Council.<\/p>\n<p>&#8220;The goal of the project is to find new side-channel vectors and mitigate them,&#8221; Brumley told us.<\/p>\n<h3>Time to end SMT\/HT support<\/h3>\n<p>Last year, another team of researchers found a similar side-channel vulnerability named <a href=\"https:\/\/www.blackhat.com\/us-18\/briefings\/schedule\/#tlbleed-when-protecting-your-cpu-caches-is-not-enough-10149\" target=\"_blank\" rel=\"noopener noreferrer\">TLBleed<\/a> impacting Intel&#8217;s Hyper-Threading (SMT) technology. Following the discovery of TLBleed, the OpenBSD project <a href=\"https:\/\/marc.info\/?l=openbsd-cvs&amp;m=152943660103446\" target=\"_blank\" rel=\"noopener noreferrer\">decided to disable support for Intel&#8217;s HT technology<\/a> in upcoming versions of the OpenBSD operating system, on the grounds of security.<\/p>\n<p>&#8220;This is the main reason we released the exploit &#8212; to show how reproducible it is,&#8221; Brumley told us, &#8220;and help to kill off the SMT trend in chips.&#8221;<\/p>\n<p>&#8220;Security and SMT are mutually exclusive concepts,&#8221; he added. &#8220;I hope our work encourages users to disable SMT in the BIOS or choose to spend their money on architectures not featuring SMT.&#8221;<\/p>\n<p>PortSmash is tracked in the CVE vulnerability tracking system with the CVE-2018-5407 identifier.<\/p>\n<h3>RELATED COVERAGE:<\/h3>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Vulnerability confirmed on Skylake and Kaby Lake CPU series. Researchers suspect AMD processors are also impacted.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":17719,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-17718","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Intel CPUs impacted by new PortSmash side-channel vulnerability 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Intel CPUs impacted by new PortSmash side-channel vulnerability 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-02T12:19:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/11\/intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"435\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Intel CPUs impacted by new PortSmash side-channel vulnerability\",\"datePublished\":\"2018-11-02T12:19:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability\\\/\"},\"wordCount\":767,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability.png\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability\\\/\",\"name\":\"Intel CPUs impacted by new PortSmash side-channel vulnerability 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability.png\",\"datePublished\":\"2018-11-02T12:19:13+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability.png\",\"width\":1000,\"height\":435},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Intel CPUs impacted by new PortSmash side-channel vulnerability\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Intel CPUs impacted by new PortSmash side-channel vulnerability 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability\/","og_locale":"en_US","og_type":"article","og_title":"Intel CPUs impacted by new PortSmash side-channel vulnerability 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-11-02T12:19:13+00:00","og_image":[{"width":1000,"height":435,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/11\/intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Intel CPUs impacted by new PortSmash side-channel vulnerability","datePublished":"2018-11-02T12:19:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability\/"},"wordCount":767,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/11\/intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability.png","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability\/","url":"https:\/\/www.threatshub.org\/blog\/intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability\/","name":"Intel CPUs impacted by new PortSmash side-channel vulnerability 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/11\/intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability.png","datePublished":"2018-11-02T12:19:13+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/11\/intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/11\/intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability.png","width":1000,"height":435},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/intel-cpus-impacted-by-new-portsmash-side-channel-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Intel CPUs impacted by new PortSmash side-channel vulnerability"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/17718","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=17718"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/17718\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/17719"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=17718"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=17718"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=17718"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}