{"id":25442,"date":"2020-11-13T15:55:09","date_gmt":"2020-11-13T15:55:09","guid":{"rendered":"https:\/\/udsenterprise.com\/platypus-new-threat-intel-and-amd-cpus\/"},"modified":"2023-09-21T12:18:43","modified_gmt":"2023-09-21T12:18:43","slug":"platypus-new-threat-intel-and-amd-cpus","status":"publish","type":"post","link":"https:\/\/udsenterprise.com\/en\/platypus-new-threat-intel-and-amd-cpus\/","title":{"rendered":"PLATYPUS: a new threat affecting Intel and AMD CPUs"},"content":{"rendered":"<p>This vulnerability opens the door for an <strong>unprivileged user to steal data<\/strong> by reconstructing the information received through the <strong>RAPL<\/strong> power monitoring interface. This interface is included in the Intel CVE-2020-8694, CVE-2020-8695 and AMD CVE-2020-12912 processors.<\/p>\n<p><strong>Linux operating systems are more vulnerable to PLATYPUS<\/strong>, as the kernel&#8217;s Powercap framework allows users without administrator permissions to access RAPL counters. In this way, CPU and DRAM consumption is exposed to possible tracing. <strong>Carrying out this attack on Windows and macOS systems requires additional effort<\/strong>, as the Inter Power Gadget package needs to be installed, which requires privileged access.<\/p>\n<p>Both <strong>Intel<\/strong> and <strong>AMD<\/strong>, as well as the developers of the <strong>Xen<\/strong> hypervisor, <strong>have already released patches<\/strong> to prevent their products from being affected by this attack.<\/p>\n<p>More information <strong><a href=\"https:\/\/platypusattack.com\/\" target=\"_blank\" rel=\"nofollow noopener\">at this link<\/a><\/strong>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new <strong>side channel attack<\/strong> threatens <strong>Intel and AMD<\/strong> CPUs. It has been discovered by a group of Austrian researchers from the Graz University of Technology. They have called it <strong>PLATYPUS<\/strong> and it allows exploiting <strong>variations in processor power consumption to access confidential data<\/strong>. One of the characteristics that differentiate this attack from other similar ones is that it does not require physical access to the server, desktop or laptop.<\/p>\n","protected":false},"author":2,"featured_media":10659,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[985,926],"tags":[986,928],"class_list":["post-25442","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hot-news","category-security","tag-hot-news","tag-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>PLATYPUS: a new threat affecting Intel and AMD CPUs<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/udsenterprise.com\/en\/platypus-new-threat-intel-and-amd-cpus\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PLATYPUS: a new threat affecting Intel and AMD CPUs\" \/>\n<meta property=\"og:description\" content=\"A new side channel attack threatens Intel and AMD CPUs. It has been discovered by a group of Austrian researchers from the Graz University of Technology. They have called it PLATYPUS and it allows exploiting variations in processor power consumption to access confidential data. One of the characteristics that differentiate this attack from other similar ones is that it does not require physical access to the server, desktop or laptop.\" \/>\n<meta property=\"og:site_name\" content=\"UDS Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-13T15:55:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-21T12:18:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2022\/11\/img-linea-blanca.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"67\" \/>\n\t<meta property=\"og:image:height\" content=\"4\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"author\" content=\"UDS Enterprise Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2022\/11\/img-linea-blanca.gif\" \/>\n<meta name=\"twitter:creator\" content=\"@VirtualCable_\" \/>\n<meta name=\"twitter:site\" content=\"@VirtualCable_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"UDS Enterprise Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/udsenterprise.com\/en\/platypus-new-threat-intel-and-amd-cpus\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/udsenterprise.com\/en\/platypus-new-threat-intel-and-amd-cpus\/\"},\"author\":{\"name\":\"UDS Enterprise Team\",\"@id\":\"https:\/\/udsenterprise.com\/en\/#\/schema\/person\/83f63ed09241332cf10f8f6e7bbdd920\"},\"headline\":\"PLATYPUS: a new threat affecting Intel and AMD CPUs\",\"datePublished\":\"2020-11-13T15:55:09+00:00\",\"dateModified\":\"2023-09-21T12:18:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/udsenterprise.com\/en\/platypus-new-threat-intel-and-amd-cpus\/\"},\"wordCount\":140,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/udsenterprise.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/udsenterprise.com\/en\/platypus-new-threat-intel-and-amd-cpus\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/platypus-intel-amd-cpus.jpg\",\"keywords\":[\"Hot news\",\"Security\"],\"articleSection\":[\"Hot news\",\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/udsenterprise.com\/en\/platypus-new-threat-intel-and-amd-cpus\/#respond\"]}]},{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\/\/udsenterprise.com\/en\/platypus-new-threat-intel-and-amd-cpus\/\",\"url\":\"https:\/\/udsenterprise.com\/en\/platypus-new-threat-intel-and-amd-cpus\/\",\"name\":\"PLATYPUS: a new threat affecting Intel and AMD CPUs\",\"isPartOf\":{\"@id\":\"https:\/\/udsenterprise.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/udsenterprise.com\/en\/platypus-new-threat-intel-and-amd-cpus\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/udsenterprise.com\/en\/platypus-new-threat-intel-and-amd-cpus\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/platypus-intel-amd-cpus.jpg\",\"datePublished\":\"2020-11-13T15:55:09+00:00\",\"dateModified\":\"2023-09-21T12:18:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/udsenterprise.com\/en\/platypus-new-threat-intel-and-amd-cpus\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/udsenterprise.com\/en\/platypus-new-threat-intel-and-amd-cpus\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/udsenterprise.com\/en\/platypus-new-threat-intel-and-amd-cpus\/#primaryimage\",\"url\":\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/platypus-intel-amd-cpus.jpg\",\"contentUrl\":\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/platypus-intel-amd-cpus.jpg\",\"width\":800,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/udsenterprise.com\/en\/platypus-new-threat-intel-and-amd-cpus\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/udsenterprise.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hot news\",\"item\":\"https:\/\/udsenterprise.com\/en\/category\/hot-news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"PLATYPUS: a new threat affecting Intel and AMD CPUs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/udsenterprise.com\/en\/#website\",\"url\":\"https:\/\/udsenterprise.com\/en\/\",\"name\":\"UDS Enterprise\",\"description\":\"UDS Enterprise es una soluci\u00f3n segura y flexible para virtualizaci\u00f3n de escritorios y acceso remoto, compatible con Windows, Linux y macOS.\",\"publisher\":{\"@id\":\"https:\/\/udsenterprise.com\/en\/#organization\"},\"alternateName\":\"UDS Enterprise\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/udsenterprise.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/udsenterprise.com\/en\/#organization\",\"name\":\"UDS Enterprise\",\"alternateName\":\"UDS Enterprise\",\"url\":\"https:\/\/udsenterprise.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/udsenterprise.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/05\/img-logotipo-top-00-udsenterprise.jpg\",\"contentUrl\":\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/05\/img-logotipo-top-00-udsenterprise.jpg\",\"width\":300,\"height\":202,\"caption\":\"UDS Enterprise\"},\"image\":{\"@id\":\"https:\/\/udsenterprise.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/VirtualCable_\",\"https:\/\/es.linkedin.com\/company\/virtualcable\",\"https:\/\/www.youtube.com\/@UDSEnterprise\"],\"description\":\"Virtual Cable es una empresa espa\u00f1ola especializada en soluciones de virtualizaci\u00f3n del puesto de trabajo. Su producto estrella, UDS Enterprise, es un broker de conexiones multiplataforma que permite la administraci\u00f3n y despliegue de escritorios virtuales Windows y Linux, la virtualizaci\u00f3n de aplicaciones y el acceso remoto a equipos f\u00edsicos con sistemas operativos Windows, Linux y macOS\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/udsenterprise.com\/en\/#\/schema\/person\/83f63ed09241332cf10f8f6e7bbdd920\",\"name\":\"UDS Enterprise Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/udsenterprise.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g\",\"caption\":\"UDS Enterprise Team\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"PLATYPUS: a new threat affecting Intel and AMD CPUs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/udsenterprise.com\/en\/platypus-new-threat-intel-and-amd-cpus\/","og_locale":"en_US","og_type":"article","og_title":"PLATYPUS: a new threat affecting Intel and AMD CPUs","og_description":"A new side channel attack threatens Intel and AMD CPUs. It has been discovered by a group of Austrian researchers from the Graz University of Technology. They have called it PLATYPUS and it allows exploiting variations in processor power consumption to access confidential data. One of the characteristics that differentiate this attack from other similar ones is that it does not require physical access to the server, desktop or laptop.","og_site_name":"UDS Enterprise","article_published_time":"2020-11-13T15:55:09+00:00","article_modified_time":"2023-09-21T12:18:43+00:00","og_image":[{"width":67,"height":4,"url":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2022\/11\/img-linea-blanca.gif","type":"image\/gif"}],"author":"UDS Enterprise Team","twitter_card":"summary_large_image","twitter_image":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2022\/11\/img-linea-blanca.gif","twitter_creator":"@VirtualCable_","twitter_site":"@VirtualCable_","twitter_misc":{"Written by":"UDS Enterprise Team","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/udsenterprise.com\/en\/platypus-new-threat-intel-and-amd-cpus\/#article","isPartOf":{"@id":"https:\/\/udsenterprise.com\/en\/platypus-new-threat-intel-and-amd-cpus\/"},"author":{"name":"UDS Enterprise Team","@id":"https:\/\/udsenterprise.com\/en\/#\/schema\/person\/83f63ed09241332cf10f8f6e7bbdd920"},"headline":"PLATYPUS: a new threat affecting Intel and AMD CPUs","datePublished":"2020-11-13T15:55:09+00:00","dateModified":"2023-09-21T12:18:43+00:00","mainEntityOfPage":{"@id":"https:\/\/udsenterprise.com\/en\/platypus-new-threat-intel-and-amd-cpus\/"},"wordCount":140,"commentCount":0,"publisher":{"@id":"https:\/\/udsenterprise.com\/en\/#organization"},"image":{"@id":"https:\/\/udsenterprise.com\/en\/platypus-new-threat-intel-and-amd-cpus\/#primaryimage"},"thumbnailUrl":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/platypus-intel-amd-cpus.jpg","keywords":["Hot news","Security"],"articleSection":["Hot news","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/udsenterprise.com\/en\/platypus-new-threat-intel-and-amd-cpus\/#respond"]}]},{"@type":["WebPage","ItemPage"],"@id":"https:\/\/udsenterprise.com\/en\/platypus-new-threat-intel-and-amd-cpus\/","url":"https:\/\/udsenterprise.com\/en\/platypus-new-threat-intel-and-amd-cpus\/","name":"PLATYPUS: a new threat affecting Intel and AMD CPUs","isPartOf":{"@id":"https:\/\/udsenterprise.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/udsenterprise.com\/en\/platypus-new-threat-intel-and-amd-cpus\/#primaryimage"},"image":{"@id":"https:\/\/udsenterprise.com\/en\/platypus-new-threat-intel-and-amd-cpus\/#primaryimage"},"thumbnailUrl":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/platypus-intel-amd-cpus.jpg","datePublished":"2020-11-13T15:55:09+00:00","dateModified":"2023-09-21T12:18:43+00:00","breadcrumb":{"@id":"https:\/\/udsenterprise.com\/en\/platypus-new-threat-intel-and-amd-cpus\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/udsenterprise.com\/en\/platypus-new-threat-intel-and-amd-cpus\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/udsenterprise.com\/en\/platypus-new-threat-intel-and-amd-cpus\/#primaryimage","url":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/platypus-intel-amd-cpus.jpg","contentUrl":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/platypus-intel-amd-cpus.jpg","width":800,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/udsenterprise.com\/en\/platypus-new-threat-intel-and-amd-cpus\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/udsenterprise.com\/en\/"},{"@type":"ListItem","position":2,"name":"Hot news","item":"https:\/\/udsenterprise.com\/en\/category\/hot-news\/"},{"@type":"ListItem","position":3,"name":"PLATYPUS: a new threat affecting Intel and AMD CPUs"}]},{"@type":"WebSite","@id":"https:\/\/udsenterprise.com\/en\/#website","url":"https:\/\/udsenterprise.com\/en\/","name":"UDS Enterprise","description":"UDS Enterprise es una soluci\u00f3n segura y flexible para virtualizaci\u00f3n de escritorios y acceso remoto, compatible con Windows, Linux y macOS.","publisher":{"@id":"https:\/\/udsenterprise.com\/en\/#organization"},"alternateName":"UDS Enterprise","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/udsenterprise.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/udsenterprise.com\/en\/#organization","name":"UDS Enterprise","alternateName":"UDS Enterprise","url":"https:\/\/udsenterprise.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/udsenterprise.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/05\/img-logotipo-top-00-udsenterprise.jpg","contentUrl":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/05\/img-logotipo-top-00-udsenterprise.jpg","width":300,"height":202,"caption":"UDS Enterprise"},"image":{"@id":"https:\/\/udsenterprise.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/VirtualCable_","https:\/\/es.linkedin.com\/company\/virtualcable","https:\/\/www.youtube.com\/@UDSEnterprise"],"description":"Virtual Cable es una empresa espa\u00f1ola especializada en soluciones de virtualizaci\u00f3n del puesto de trabajo. Su producto estrella, UDS Enterprise, es un broker de conexiones multiplataforma que permite la administraci\u00f3n y despliegue de escritorios virtuales Windows y Linux, la virtualizaci\u00f3n de aplicaciones y el acceso remoto a equipos f\u00edsicos con sistemas operativos Windows, Linux y macOS"},{"@type":"Person","@id":"https:\/\/udsenterprise.com\/en\/#\/schema\/person\/83f63ed09241332cf10f8f6e7bbdd920","name":"UDS Enterprise Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/udsenterprise.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g","caption":"UDS Enterprise Team"}}]}},"_links":{"self":[{"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/posts\/25442","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/comments?post=25442"}],"version-history":[{"count":1,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/posts\/25442\/revisions"}],"predecessor-version":[{"id":27703,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/posts\/25442\/revisions\/27703"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/media\/10659"}],"wp:attachment":[{"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/media?parent=25442"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/categories?post=25442"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/tags?post=25442"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}