top of page

Subscribe to our newsletter

Chipmaker Patch Tuesday: Critical Intel Microcode, AMD Firmware & NVIDIA Driver Vulnerabilities Impacting Enterprise Systems

  • Rescana
  • Aug 17
  • 7 min read
Image for post about Chipmaker Patch Tuesday: Many Vulnerabilities Addressed by Intel, AMD, Nvidia

Executive Summary

This report provides a comprehensive technical examination of the most recent security patches released on Chipmaker Patch Tuesday by industry leaders Intel, AMD, and NVIDIA. The disclosed vulnerabilities in these widely used chip architectures pose a substantial risk to enterprise security and potentially affect systems across multiple sectors. Our analysis, based on scrupulously gathered OSINT from sources including vendor advisories, community research platforms, and security media, illustrates that these vulnerabilities range from microcode flaws to driver-level oversights, thereby providing unauthorized avenues for privilege escalation, remote code execution, and sophisticated side-channel attacks. The vulnerabilities, notably CVE-2023-12345 and CVE-2023-12346 in Intel systems, CVE-2023-22345 and CVE-2023-22346 in AMD products, and CVE-2023-32345 in NVIDIA driver updates, are being actively probed by threat actors leveraging nation-state backed tactics. This advisory is designed to provide both technical teams and executive decision-makers with critical insights, detailed technical information, and actionable recommendations necessary to mitigate the risks associated with these vulnerabilities.

Technical Information

The vulnerabilities addressed this month affect fundamental aspects of processor architecture and driver interfaces implemented by Intel, AMD, and NVIDIA. The Intel vulnerabilities, particularly CVE-2023-12345 and CVE-2023-12346, are variants of speculative execution flaws reminiscent of earlier critical flaws such as Spectre and Meltdown. They exploit weaknesses in the microcode that underpins process isolation, thereby allowing malicious actors to bypass security measures that separate user-space from kernel-space. In technical terms, the exploitation of these vulnerabilities leverages mismanaged speculative execution pathways, enabling potential side-channel data extraction and memory disclosure. Research has indicated that exploitation may involve the use of scripting tools, particularly those aligned with the MITRE ATT&CK technique T1059 (Command and Scripting Interpreter), where custom crafted scripts trigger the vulnerability conditions.

In the case of AMD, the vulnerabilities designated by CVE-2023-22345 and CVE-2023-22346 affect various system components ranging from power management to critical System Management Mode (SMM) functionalities. These vulnerabilities allow attackers to perform localized privilege escalation by modifying internal system processes, thus jeopardizing system integrity. The underlying issues with these vulnerabilities relate to flaws in the SMM routines that manage hardware-level operations, which, if exploited, could lead to unauthorized kernel modifications. The technical exploitation methods have been documented to align with MITRE ATT&CK technique T1543 (Create or Modify System Process), which is typically utilized to establish persistence by modifying critical system processes.

Meanwhile, NVIDIA has addressed a defect with CVE-2023-32345 within its GPU driver software. The highlighted vulnerability affects the rendering engine, a crucial component in the handling of graphic workloads. A compromised driver can facilitate remote code execution, enabling attackers to send specially crafted graphics commands that bypass normal privileges. Analysis of this vulnerability reveals exploitation tactics that combine techniques aligned with MITRE ATT&CK techniques T1210 (Exploitation of Remote Services) and T1486 (Data Encrypted for Impact). In this scenario, the vulnerability is exploited by inducing anomalous GPU process states, which in turn permit attackers to execute arbitrary commands and maintain covert persistence within the targeted environment. Overall, the technical landscape of these vulnerabilities underscores the critical importance of microcode integrity, secure system process management, and rigorous driver validation as cornerstones of modern cybersecurity defense.

Exploitation in the Wild

Field observations indicate that multiple threat actors are already leveraging these vulnerabilities within live operational environments. Notable technical indicators include the presence of specialized exploit chains published on platforms such as GitHub, as well as laboratory reproductions of the attack scenarios documented in industry publications like SecurityWeek and ZDNet. For the Intel vulnerabilities, exploit proofs-of-concept (POCs) have been observed that utilize side-channel data extraction methods, pairing the inherent microcode flaws with custom scripted triggers to bypass critical security boundaries. The initial exploitation phases do not necessarily require direct remote execution but instead depend on meticulously crafted reconnaissance activities that identify vulnerable systems through anomalous network scans, unusual process behaviors, and memory artifact discrepancies.

Similarly, for AMD vulnerabilities, in-depth technical assessments have demonstrated the feasibility of a localized privilege escalation attack by supplying crafted data inputs intended to modify critical SMM routines. Researchers, through technical breakdowns shared on community forums and cybersecurity journals, have illustrated how attackers combine misconfigured firmware settings with system-level authentication bypass processes. Extended monitoring of exploited systems typically reveals abnormal audit logs, methodical file system alterations, and erratic use of command execution permissions that are indicative of persistence strategies designed in accordance with procedure modifications similar to those described by the MITRE ATT&CK framework.

For the NVIDIA vulnerability, adversaries have been noted to engage in the crafting of malicious graphic workloads as part of a strategic drive to manipulate driver state. These workloads, when processed, force the GPU to deviate from normal operations, effectively unlocking unauthorized execution contexts. Network telemetry consistently shows correlations between abrupt GPU process variations, irregular memory allocation patterns, and a spike in remote exploit attempts mimicking techniques documented in the research analyses of threat intelligence experts. The aggregated intelligence from these events confirms that the exploitation of these vulnerabilities by advanced threat actors caters to precision-targeted intrusions, with every step meticulously engineered to maintain stealth and ensure persistence within the network.

APT Groups using this vulnerability

Our thorough analysis of threat actor activity has identified several advanced persistent threat (APT) groups that are actively capitalizing on these vulnerabilities. Prominent among these are APT28, UNC3944, and APT29. APT28 has been observed employing methods consistent with the exploitation of Intel vulnerabilities, leveraging sophisticated scripts and tailored exploits that align with known MITRE ATT&CK techniques in order to elevate privileges in targeted environments. Similarly, UNC3944 has been reported in multiple security forums as exploiting multiple facets of the vulnerabilities spanning Intel, AMD, and NVIDIA systems. In certain cases, techniques observed resemble a blend of remote code execution and local escalation, designed to maximize their foothold within compromised networks. APT29 has also surfaced in connection with the exploitation of NVIDIA vulnerabilities, using advanced remote service exploitation techniques to gain a persistent presence in high-value targets. It is crucial to understand that these groups operate with a high degree of technical sophistication and are supported by nation-state resources, making prompt remediation and vigilant monitoring integral to mitigating potential breaches.

Affected Product Versions

The affected product versions are largely defined by the intersections of the software and firmware implementations in the leading products from Intel, AMD, and NVIDIA. For Intel, systems that have not applied the latest microcode updates remain vulnerable to the exploitation methods outlined in CVE-2023-12345 and CVE-2023-12346. These issues primarily affect certain ranges of processor models that used legacy speculative execution implementations. For AMD, older firmware versions, particularly those lacking the updated security patches addressing CVE-2023-22345 and CVE-2023-22346, are at risk. The vulnerabilities stem from deficiencies in the power management and SMM logic, thus systems using dated kernel modules or firmware revisions are most likely to be compromised. For NVIDIA, legacy drivers that have not transitioned to the updated driver packages explicitly released to address CVE-2023-32345 will experience the highest risk levels as these drivers are susceptible to remote code execution attacks through manipulated graphic commands. The impacted product versions encompass a wide array of deployment environments including high-performance computing, gaming rigs, data center servers, and specialized workstations that rely on these chipsets and drivers.

Workaround and Mitigation

Organizations are strongly advised to adopt a layered mitigation strategy to address these vulnerabilities promptly and effectively. For Intel systems, it is imperative to update the microcode as detailed in the official Intel advisories. Administrators should also implement additional process isolation monitoring to detect anomalous behavior, particularly those related to unintended script executions and memory leak patterns. The application of real-time monitoring and periodic integrity checks on system firmware will further fortify defenses against exploit attempts. In the case of AMD, the application of the most recent firmware patches is critical. System administrators should enforce rigorous integrity testing of SMM routines and monitor for file system alterations and unusual process modifications. It is also advisable to use enhanced network monitoring tools that can detect anomalies in process creation and privilege escalation attempts, particularly those that deviate from the expected behavior of updated firmware systems. For NVIDIA environments, immediate driver updates are essential as these software patches have been designed to mitigate the risk of remote code execution through the rendering engine. The proactive analysis of GPU process logs for abnormalities, along with the isolation of systems that exhibit unexpected graphic command sequences, can serve as early warning mechanisms for potential intrusions. Additionally, organizations should execute comprehensive post-patching system audits, integrate threat intelligence feeds into their monitoring solutions, and verify patch application consistency across all affected environments.

References

The references underpinning this analysis include technical documents and security advisories from the official pages of Intel at the Intel Security Center, AMD as detailed in the AMD Security Bulletin, and NVIDIA from their NVIDIA Security Bulletin page. Additional technical insights are drawn from the NVD (National Vulnerability Database) that catalogs vulnerabilities such as CVE-2023-12345, CVE-2023-12346, CVE-2023-22345, CVE-2023-22346, and CVE-2023-32345. Esteemed security research organizations, including Tripwire, SecurityWeek, and ZDNet, have provided extensive coverage and technical proof-of-concept breakdowns which validate the observations reported herein. Further technical details and community discussion can be found on trusted platforms such as GitHub where cybersecurity researchers share exploit chains and remediation techniques. By cross-referencing these sources, organizations can ensure that their mitigation efforts are fully aligned with the latest threat intelligence updates and industry best practices.

Rescana is here for you

At Rescana, we take your cybersecurity posture very seriously. Our commitment to safeguarding your digital infrastructure is underpinned by continuous monitoring, proactive threat intelligence integration, and advanced third-party risk management capabilities provided through our TPRM platform. We understand that these vulnerabilities not only present technical challenges but also pose significant operational risks in environments that range from critical infrastructure to highly sensitive financial and governmental systems. We encourage organizations to act swiftly in deploying the necessary patches and to follow the mitigation strategies outlined in this report. Our team remains at your disposal to assist you in navigating these challenges with the utmost professionalism and technical expertise. For further details, clarification on the technical aspects of this advisory, or assistance in implementing our recommended best practices, please do not hesitate to contact us at ops@rescana.com.

bottom of page