- Speculative execution-based attacks exploit CPU architecture flaws to allow attackers to leak sensitive information from privileged operating system kernel memory
- The SWAPGS Attack leverages a new speculative execution vulnerability discovered by Bitdefender security researchers
- The SWAGS Attack circumvents all existing side-channel attack mitigations and allows attackers to gain unprivileged access to kernel sensitive data
- Bitdefender Hypervisor Introspection technology mitigates the SWAPGS Attack on unpatched Windows systems running on Citrix Hypervisor or KVM hypervisor
Today, multiple industry software and hardware vendors have published security advisories for CVE-2019-1125 related to a newly discovered side-channel attack, dubbed SWAPGS Attack. The SWAPGS Attack was identified and reported by Bitdefender security researchers working on hypervisor introspection and anti-exploit technologies. This led to a coordinated disclosure process that has included several strategic industry partners.