CVE-2023-20569
vulnerability analysis and mitigation

Overview

A side channel vulnerability identified as CVE-2023-20569 (also known as INCEPTION or Speculative Return Stack Overflow) affects AMD CPUs. The vulnerability was discovered by researchers from ETH Zurich as an extension of their prior research on Branch Type Confusion (Retbleed). The issue affects all AMD Zen CPUs (Zen1 through Zen4 microarchitectures) and was disclosed in August 2023 (XEN Advisory, ETH Research).

Technical details

The vulnerability exploits the Return Address Stack (RAS) in AMD CPUs. The RAS is updated when a CALL instruction is predicted, rather than at a later point in the pipeline. Due to its circular stack nature, an attacker can poison the branch type and target predictions to wrap around the entire RAS, overwriting correct return predictions with attacker-controlled ones. This manipulation allows the attacker to control RET speculation in a victim context. The vulnerability has been assigned a CVSS v3.1 base score of 4.7 (Medium) with the vector AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N (NVD).

Impact

When successfully exploited, this vulnerability allows an attacker to control speculative execution at an attacker-controlled address, potentially leading to information disclosure through speculative side-channels. An attacker might be able to infer the contents of memory belonging to other guests in virtualized environments (XEN Advisory).

Mitigation and workarounds

AMD has released microcode updates for affected processors, particularly targeting Zen3 and Zen4 CPUs. For systems running Xen hypervisor, booting with 'spec-ctrl=ibpb-entry' parameter is recommended after applying the microcode update. On Zen2 and older CPUs, the existing mitigation of issuing an IBPB on entry to Xen is believed to be sufficient to protect against this vulnerability (XEN Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management