New Hertzbleed side-channel attack allows to extract cryptographic keys from remote servers

New Hertzbleed side-channel attack allows to extract cryptographic keys from remote servers

A team of researchers from the University of Texas, University of Illinois Urbana-Champaign, and the University of Washington have shared details of a security issue affecting modern Intel and AMD processors that could allow hackers to steal cryptographic keys from remote servers via a side-channel attack involving observing variations in CPU frequency enabled by dynamic voltage and frequency scaling (DVFS).

The root cause of the issue, dubbed “Hertzbleed,” is dynamic frequency scaling, a feature designed to reduce power consumption (during low CPU loads) and to ensure that the system stays below power and thermal limits (during high CPU loads).

“First, Hertzbleed shows that on modern x86 CPUs, power side-channel attacks can be turned into (even remote!) timing attacks—lifting the need for any power measurement interface. The cause is that, under certain circumstances, periodic CPU frequency adjustments depend on the current CPU power consumption, and these adjustments directly translate to execution time differences (as 1 hertz = 1 cycle per second),” the researchers explained.

“Second, Hertzbleed shows that, even when implemented correctly as constant time, cryptographic code can still leak via remote timing analysis. The result is that current industry guidelines for how to write constant-time code (such as Intel’s one) are insufficient to guarantee constant-time execution on modern processors.”

The issue impacts all Intel processors (CVE-2022-24436) and several AMD products (CVE-2022-23823), including desktop, mobile, Chromebook, and server CPUs. While both Intel and AMD have issued separate advisories, it is understood that both vendors have no plans to release microcode patches to address Hertzbleed, although the companies did provide guidance to mitigate the issue.

“As the vulnerability impacts a cryptographic algorithm having power analysis-based side channel leakages, developers can apply countermeasures on the software code of the algorithm. Either masking, hiding, or key-rotation may be used to mitigate the attack,” AMD stated.

The researchers said that disabling frequency boost can help mitigate Hertzbleed in most cases, but it’s not recommended because it will impact performance. Furthermore, on some custom system configurations (with reduced power limits), data-dependent frequency updates may occur even when frequency boost is disabled, the research team has warned.

Back to the list

Latest Posts

Cyber Security Week in Review: June 6, 2025

Cyber Security Week in Review: June 6, 2025

In brief: a critical vBulletin bug is being exploited in the wild, new destructive PathWiper malware targets Ukraine, and more.
6 June 2025
New PathWiper malware targets critical infrastructure in Ukraine

New PathWiper malware targets critical infrastructure in Ukraine

PathWiper shares several characteristics with Sandworm's HermeticWiper, which was used in attacks against Ukraine in 2022.
5 June 2025
US seizes 145 domains linked to BidenCash carding forum

US seizes 145 domains linked to BidenCash carding forum

It is estimated that the operation generated more than $17 million in revenue since launching in March 2022.
5 June 2025