{"id":54560,"date":"2023-11-16T21:00:00","date_gmt":"2023-11-16T21:00:00","guid":{"rendered":"https:\/\/www.darkreading.com\/vulnerabilities-threats\/cachewarp-amd-vm-bug-opens-door-to-privilege-escalation"},"modified":"2023-11-16T21:00:00","modified_gmt":"2023-11-16T21:00:00","slug":"cachewarp-amd-vm-bug-opens-the-door-to-privilege-escalation","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/cachewarp-amd-vm-bug-opens-the-door-to-privilege-escalation\/","title":{"rendered":"&#8216;CacheWarp&#8217; AMD VM Bug Opens the Door to Privilege Escalation"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt38e88f37d9408193\/65566da5ce81e8040a03c17f\/AMD_HQ-michelmond-Alamy.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Researchers have developed an exploit for AMD CPUs that allows attackers to undermine memory protections, and thereby escalate privileges or perform remote code execution (RCE) in cloud environments.<\/p>\n<p>The issue lies with Secure Encrypted Virtualization (SEV), a seven-year-old extension for AMD&#8217;s EPYC server processors. The promise of SEV is that users can deploy virtual machines (VMs) even within untrusted hypervisors \u2014 environments for running multiple VMs \u2014 by encrypting their memory with a key.<\/p>\n<p>On Tuesday, though, a group of German scholars <a href=\"https:\/\/cachewarpattack.com\/paper.pdf\" target=\"_blank\" rel=\"noopener\">demonstrated in a paper<\/a> how this security feature can, in fact, expose the very chips it&#8217;s meant to protect, enabling attackers to roll back time and access exploitable data in memory.<\/p>\n<p>This so-called &#8220;CacheWarp&#8221; vulnerability, assigned <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-20592\" target=\"_blank\" rel=\"noopener\">CVE-2023-20592<\/a>, affects first- through third-generation EPYC processors (not fourth gen). It was granted a 5.3 &#8220;Medium&#8221; severity score by AMD.<\/p>\n<h2 class=\"regular-text\">What Is CacheWarp?<\/h2>\n<p>At the heart of CacheWarp is a single, exploitable instruction: &#8220;INVD.&#8221; By manipulating INVD, a malicious hypervisor user can selectively wipe the CPU&#8217;s cache at any given point, reverting it to an old state (hence the name &#8220;CacheWarp&#8221;) with stale data.<\/p>\n<p>At this point, possibilities abound.<\/p>\n<p>&#8220;As a consequence, a malicious hypervisor can break into a guest VM without knowing any password,&#8221; explains Ruiyi Zhang, one of the report&#8217;s authors. <a href=\"https:\/\/cachewarpattack.com\/#faq\" target=\"_blank\" rel=\"noopener\">On CacheWarp&#8217;s website<\/a>, his team provided a simple example for how it could go down:<\/p>\n<p>&#8220;Assume you have a variable determining whether a user is successfully authenticated. By exploiting CacheWarp, an attacker can revert the variable to a previous state and thus take over an old (already authenticated) session. Furthermore, an attacker can revert the return addresses stored on the stack and, by that, change the control flow of a victim program,&#8221; they explained.<\/p>\n<p>In such a case, Zhang says, &#8220;they can achieve privilege escalation, get to the root of your VM, and, in the end, they can just do anything.&#8221;<\/p>\n<h2 class=\"regular-text\">A Patch Is Now Available<\/h2>\n<p>The researchers first reached out to AMD in late April. On November 14 \u2014 the day CacheWarp was revealed, and <a href=\"https:\/\/github.com\/cispa\/CacheWarp\" target=\"_blank\" rel=\"noopener\">a proof-of-concept (PoC) exploit<\/a> released to GitHub \u2014 AMD released a microcode patch for third-generation EPYC chips. Unlike with <a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/intel-downfall-lawsuit-10k-plaintiff-ignoring-chip-bug\" target=\"_blank\" rel=\"noopener\">recent transient execution bugs affecting similar chips<\/a>, the patch isn&#8217;t expected to cause any performance issues.<\/p>\n<p>&#8220;No mitigation is available for the first or second generations of EPYC processors,&#8221; <a href=\"https:\/\/www.amd.com\/en\/resources\/product-security\/bulletin\/amd-sb-3005.html\" target=\"_blank\" rel=\"noopener\">AMD noted in a security bulletin<\/a>, &#8220;since the SEV and SEV-ES [Encrypted State] features are not designed to protect guest VM memory integrity and the SEV-SNP [Secure Nested Paging] is not available.&#8221;<\/p>\n<p>When asked about the delay in releasing a patch, AMD told Dark Reading that &#8220;Coordinated Vulnerability Disclosure is standard practice in the industry to protect end users. Notification is made to the impacted parties, fixes are developed, then the bulletin and details are published.&#8221;<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/cachewarp-amd-vm-bug-opens-door-to-privilege-escalation\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Academics in Germany figured out how to reverse time in AMD virtualization environments, then reap the spoils.Read More <a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/cachewarp-amd-vm-bug-opens-door-to-privilege-escalation\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-54560","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>&#039;CacheWarp&#039; AMD VM Bug Opens the Door to Privilege Escalation 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/cachewarp-amd-vm-bug-opens-the-door-to-privilege-escalation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"&#039;CacheWarp&#039; AMD VM Bug Opens the Door to Privilege Escalation 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/cachewarp-amd-vm-bug-opens-the-door-to-privilege-escalation\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-16T21:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt38e88f37d9408193\/65566da5ce81e8040a03c17f\/AMD_HQ-michelmond-Alamy.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cachewarp-amd-vm-bug-opens-the-door-to-privilege-escalation\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cachewarp-amd-vm-bug-opens-the-door-to-privilege-escalation\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"&#8216;CacheWarp&#8217; AMD VM Bug Opens the Door to Privilege Escalation\",\"datePublished\":\"2023-11-16T21:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cachewarp-amd-vm-bug-opens-the-door-to-privilege-escalation\\\/\"},\"wordCount\":475,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cachewarp-amd-vm-bug-opens-the-door-to-privilege-escalation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt38e88f37d9408193\\\/65566da5ce81e8040a03c17f\\\/AMD_HQ-michelmond-Alamy.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cachewarp-amd-vm-bug-opens-the-door-to-privilege-escalation\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cachewarp-amd-vm-bug-opens-the-door-to-privilege-escalation\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cachewarp-amd-vm-bug-opens-the-door-to-privilege-escalation\\\/\",\"name\":\"'CacheWarp' AMD VM Bug Opens the Door to Privilege Escalation 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cachewarp-amd-vm-bug-opens-the-door-to-privilege-escalation\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cachewarp-amd-vm-bug-opens-the-door-to-privilege-escalation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt38e88f37d9408193\\\/65566da5ce81e8040a03c17f\\\/AMD_HQ-michelmond-Alamy.jpg\",\"datePublished\":\"2023-11-16T21:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cachewarp-amd-vm-bug-opens-the-door-to-privilege-escalation\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cachewarp-amd-vm-bug-opens-the-door-to-privilege-escalation\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cachewarp-amd-vm-bug-opens-the-door-to-privilege-escalation\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt38e88f37d9408193\\\/65566da5ce81e8040a03c17f\\\/AMD_HQ-michelmond-Alamy.jpg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt38e88f37d9408193\\\/65566da5ce81e8040a03c17f\\\/AMD_HQ-michelmond-Alamy.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cachewarp-amd-vm-bug-opens-the-door-to-privilege-escalation\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"&#8216;CacheWarp&#8217; AMD VM Bug Opens the Door to Privilege Escalation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"'CacheWarp' AMD VM Bug Opens the Door to Privilege Escalation 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/cachewarp-amd-vm-bug-opens-the-door-to-privilege-escalation\/","og_locale":"en_US","og_type":"article","og_title":"'CacheWarp' AMD VM Bug Opens the Door to Privilege Escalation 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/cachewarp-amd-vm-bug-opens-the-door-to-privilege-escalation\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-11-16T21:00:00+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt38e88f37d9408193\/65566da5ce81e8040a03c17f\/AMD_HQ-michelmond-Alamy.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/cachewarp-amd-vm-bug-opens-the-door-to-privilege-escalation\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/cachewarp-amd-vm-bug-opens-the-door-to-privilege-escalation\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"&#8216;CacheWarp&#8217; AMD VM Bug Opens the Door to Privilege Escalation","datePublished":"2023-11-16T21:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cachewarp-amd-vm-bug-opens-the-door-to-privilege-escalation\/"},"wordCount":475,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cachewarp-amd-vm-bug-opens-the-door-to-privilege-escalation\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt38e88f37d9408193\/65566da5ce81e8040a03c17f\/AMD_HQ-michelmond-Alamy.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/cachewarp-amd-vm-bug-opens-the-door-to-privilege-escalation\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/cachewarp-amd-vm-bug-opens-the-door-to-privilege-escalation\/","url":"https:\/\/www.threatshub.org\/blog\/cachewarp-amd-vm-bug-opens-the-door-to-privilege-escalation\/","name":"'CacheWarp' AMD VM Bug Opens the Door to Privilege Escalation 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cachewarp-amd-vm-bug-opens-the-door-to-privilege-escalation\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cachewarp-amd-vm-bug-opens-the-door-to-privilege-escalation\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt38e88f37d9408193\/65566da5ce81e8040a03c17f\/AMD_HQ-michelmond-Alamy.jpg","datePublished":"2023-11-16T21:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/cachewarp-amd-vm-bug-opens-the-door-to-privilege-escalation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/cachewarp-amd-vm-bug-opens-the-door-to-privilege-escalation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/cachewarp-amd-vm-bug-opens-the-door-to-privilege-escalation\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt38e88f37d9408193\/65566da5ce81e8040a03c17f\/AMD_HQ-michelmond-Alamy.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt38e88f37d9408193\/65566da5ce81e8040a03c17f\/AMD_HQ-michelmond-Alamy.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/cachewarp-amd-vm-bug-opens-the-door-to-privilege-escalation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"&#8216;CacheWarp&#8217; AMD VM Bug Opens the Door to Privilege Escalation"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54560","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=54560"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54560\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=54560"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=54560"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=54560"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}