Protected Virtual Machines Exposed to New 'CacheWarp' AMD CPU Attack
Briefly

CacheWarp, the attack method, can allow hackers to hijack control flow, break into an encrypted VM, and escalate privileges.
For a simple example, assume you have a variable determining whether a user is successfully authenticated. By exploiting CacheWarp, an attacker can revert the variable to a previous state and thus take over an old (already authenticated) session. Furthermore, an attacker can manipulate the return address stored on the stack and, by that, change the control flow of a victim program.
CacheWarp is described as a software-based fault injection attack that exploits a hardware issue in AMD CPUs. It is not a transient-execution or side-channel attack, but a result of an architectural bug.
Read at SecurityWeek
[
]
[
|
]