{"id":45633,"date":"2022-03-08T22:36:00","date_gmt":"2022-03-08T22:36:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus\/"},"modified":"2022-03-08T22:36:00","modified_gmt":"2022-03-08T22:36:00","slug":"new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus\/","title":{"rendered":"New attack bypasses hardware defenses for Spectre flaw in Intel and ARM CPUs"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/08\/circuit_board_hardware_with_cpu_displaying_glowing_binary_code_processing_programming_encryption_data_security_by_matejmo_gettyimages-532174758_cso_nw_2400x1600-100855187-large.jpg?auto=webp&amp;quality=85,70\" class=\"ff-og-image-inserted\"><\/div>\n<p>The hardware-based mitigations introduced in Intel and ARM CPUs over the past few years to fix a serious flaw called Spectre are not as strong as believed. Researchers have devised a new attack method that can defeat the defenses, but exploitation is not as easy as with the original flaw.<\/p>\n<p><a href=\"https:\/\/www.vusec.net\/projects\/bhi-spectre-bhb\/\" rel=\"nofollow noopener\" target=\"_blank\">The new attack<\/a>, discovered by researchers from the Systems and Network Security Group at VU Amsterdam (VUSec) is called Spectre-BHI, for Branch History Injection, or Spectre-BHB, for Branch History Buffer, because Intel and ARM assigned different names to it. According to the research team, it is an extension of the 2017 Spectre version 2 attack, also known as Spectre-BTI (Branch Target Injection) and, similarly to Spectre v2, can result in the leak of sensitive information from the privileged kernel memory space.<\/p>\n<p>The proof-of-concept exploit created by the VUSec researchers leaks the hash of the root password from the \/etc\/shadow file by using an unprivileged account. The \/etc\/shadow file is a system file on Linux that is only accessible to the root administrative account. Essentially, the exploit forces the kernel to load the file into memory, where it would normally be protected from access by unprivileged processes, but then leverages the Spectre-BHI attack to access and leak its contents. This is a major security breach of the fundamental security boundary in modern operating systems that separates usermode applications and memory space from privileged kernel memory space.<\/p>\n<h2><strong>What is Spectre?<\/strong><\/h2>\n<p><a href=\"https:\/\/www.csoonline.com\/article\/3410046\/hardware-and-firmware-vulnerabilities-a-guide-to-the-threats.html\" rel=\"noopener\" target=\"_blank\">Spectre<\/a> is a class of security vulnerabilities, originally disclosed by January 2017, that stem from a performance-related feature of modern CPUs called speculative execution where the CPU tries to predict in advance which path a program&#8217;s execution will take when it reaches a conditional branch and execute instructions on that path in advance. If the prediction, which is based on internal algorithms, turns out to be bad, the results stored in temporary CPU caches are discarded. Speculative execution attacks like Spectre, and many others that followed, trick this mechanism to leak information from temporary caches that act as side channels.<\/p>\n<p>&#8220;Back in the days when Spectre was found, you could easily exploit Branch Target Injection (BTI or Spectre-v2), the most dangerous Spectre variant, across privilege levels,&#8221; the VUSec researchers explain. &#8220;For example, an unprivileged userland attacker could feed any branch target to the indirect branch predictor from userland and trick the kernel into speculatively jumping into the injected target code location and executing the code found there.&#8221;<\/p>\n<p>To mitigate the risk, software vendors such as Google and the Linux kernel developers came up with software-based solutions such as retpoline. While these were effective, they introduced a significant performance hit, so CPU vendors later developed hardware-based defenses. Intel&#8217;s is called EIBRS and ARM&#8217;s is called CSV2.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id> <\/aside>\n<p>&#8220;These solutions are complex\u2014<a href=\"http:\/\/download.vusec.net\/papers\/bhi-spectre-bhb_sec22.pdf\" rel=\"nofollow noopener\" target=\"_blank\">read the paper<\/a> to learn more about them\u2014but the gist of them is that the predictor &#8216;somehow&#8217; keeps track of the privilege level (user\/kernel) in which a target is executed,&#8221; the VUSec researchers explain. &#8220;And, as you may expect, if the target belongs to a lower privilege level, kernel execution won\u2019t use it (i.e., no more arbitrary attacker-provided code locations to speculatively hijack the kernel control flow into).&#8221;<\/p>\n<p>The problem, however, is that the CPU&#8217;s predictor relies on a global history to select the target entries to speculatively execute and, as the VUSec researchers proved, this global history can be poisoned. In other words, while the original Spectre v2 allowed attackers to actually inject target code locations and then trick the kernel to execute that code, the new Spectre-BHI\/BHB attack can only force the kernel to mispredict and execute interesting code gadgets or snippets that already exist in the history and were executed in the past, but which might leak data.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id> <\/aside>\n<p>&#8220;Are Intel eIBRS and Arm CSV2 broken? Sort of,&#8221; the researchers said. &#8220;That is, the mitigations work as intended, but the residual attack surface is much more significant than vendors originally assumed. [&#8230;] Nevertheless, finding exploitable gadgets is harder than before since the attacker can\u2019t directly inject predictor targets across privilege boundaries.&#8221;<\/p>\n<h2><strong>Mitigating the new Spectre-BHI vulnerability<\/strong><\/h2>\n<p>Intel tracks the new Spectre-BHI vulnerability as CVE-2022-0001, for the cross-privilege variation and CVE-2022-0002 for the same-privilege variation. ARM tracks it as CVE- 2022-23960 for both variations.<\/p>\n<p><a href=\"https:\/\/cdrdv2.intel.com\/v1\/dl\/getContent\/691322\" rel=\"nofollow noopener\" target=\"_blank\">According to Intel<\/a>, most of the company&#8217;s CPUs are affected aside from those in the Atom family. For ARM, the vulnerable CPUs are Cortex-A15, Cortex-A57, Cortex-A72, Cortex-A73, Cortex-A75, Cortex-A76, Cortex-A76AE, Cortex-A77, Cortex-A78, Cortex-A78AE, Cortex-A78C, Cortex-X1, Cortex-X2, Cortex-A710, Neoverse N1, Neoverse N2, and Neoverse V1.<\/p>\n<p>Both companies have released advisories and will make software mitigations available for now. ARM has <a href=\"https:\/\/developer.arm.com\/support\/arm-security-updates\/speculative-processor-vulnerability\/spectre-bhb\" rel=\"nofollow noopener\" target=\"_blank\">five different mitigations<\/a> depending on the system. <\/p>\n<p>For their Linux exploit, the VUSec researchers abused eBPF, a technology available since kernel 4.4 that can run sandboxed programs in an operating system kernel. While eBPF is not part of the underlying problem and other code gadgets can be found to leak data, the presence of unprivileged eBPF &#8220;does tremendously facilitate speculative execution (and other) attacks,&#8221; according to the researchers. That&#8217;s why they recommend disabling it and some Linux distributions have started disabling it by default.<\/p>\n<aside class=\"nativo-promo nativo-promo-2 tablet desktop smartphone\" id> <\/aside>\n<aside class=\"fakesidebar\">[ Learn <a href=\"https:\/\/www.csoonline.com\/article\/3632428\/8-pitfalls-that-undermine-security-program-success.html\">8 pitfalls that undermine security program success<\/a> and <a href=\"https:\/\/www.csoonline.com\/article\/3367797\/12-tips-for-effectively-presenting-cybersecurity-to-the-board.html\">12 tips for effectively presenting cybersecurity to the board<\/a>. | <a href=\"https:\/\/www.csoonline.com\/newsletters\/signup.html\">Sign up for CSO newsletters<\/a>. ]<\/aside>\n<div class=\"end-note\"> <!-- blx4 #2004 blox4.html --> <\/p>\n<div id class=\"blx blxParticleendnote blxM2004 blox4_html blxC51120\">\n<aside> <strong>Next read this<\/strong> <\/aside>\n<\/p><\/div>\n<\/p><\/div>\n<p> READ MORE <a href=\"https:\/\/www.csoonline.com\/article\/3652525\/new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Though not as easy to exploit, this proof of concept shows that some Intel and ARM processors are still vulnerable to side-channel attacks. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":45634,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[19],"class_list":["post-45633","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-vulnerabilities"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>New attack bypasses hardware defenses for Spectre flaw in Intel and ARM CPUs 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New attack bypasses hardware defenses for Spectre flaw in Intel and ARM CPUs 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-08T22:36:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.idgesg.net\/images\/article\/2020\/08\/circuit_board_hardware_with_cpu_displaying_glowing_binary_code_processing_programming_encryption_data_security_by_matejmo_gettyimages-532174758_cso_nw_2400x1600-100855187-large.jpg?auto=webp&amp;quality=85,70\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"New attack bypasses hardware defenses for Spectre flaw in Intel and ARM CPUs\",\"datePublished\":\"2022-03-08T22:36:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus\\\/\"},\"wordCount\":899,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus.jpg\",\"keywords\":[\"Vulnerabilities\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus\\\/\",\"name\":\"New attack bypasses hardware defenses for Spectre flaw in Intel and ARM CPUs 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus.jpg\",\"datePublished\":\"2022-03-08T22:36:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerabilities\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/vulnerabilities\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"New attack bypasses hardware defenses for Spectre flaw in Intel and ARM CPUs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New attack bypasses hardware defenses for Spectre flaw in Intel and ARM CPUs 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus\/","og_locale":"en_US","og_type":"article","og_title":"New attack bypasses hardware defenses for Spectre flaw in Intel and ARM CPUs 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-03-08T22:36:00+00:00","og_image":[{"url":"https:\/\/images.idgesg.net\/images\/article\/2020\/08\/circuit_board_hardware_with_cpu_displaying_glowing_binary_code_processing_programming_encryption_data_security_by_matejmo_gettyimages-532174758_cso_nw_2400x1600-100855187-large.jpg?auto=webp&amp;quality=85,70","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"New attack bypasses hardware defenses for Spectre flaw in Intel and ARM CPUs","datePublished":"2022-03-08T22:36:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus\/"},"wordCount":899,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus.jpg","keywords":["Vulnerabilities"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus\/","url":"https:\/\/www.threatshub.org\/blog\/new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus\/","name":"New attack bypasses hardware defenses for Spectre flaw in Intel and ARM CPUs 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus.jpg","datePublished":"2022-03-08T22:36:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Vulnerabilities","item":"https:\/\/www.threatshub.org\/blog\/tag\/vulnerabilities\/"},{"@type":"ListItem","position":3,"name":"New attack bypasses hardware defenses for Spectre flaw in Intel and ARM CPUs"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45633","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=45633"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45633\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/45634"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=45633"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=45633"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=45633"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}