Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

A New Class of Threats: AMD Warns of Transient Scheduler Attacks Impacting a Wide Range of CPUs


AMD has issued an alert about new transient scheduler attacks (TSA) that can compromise the security of its CPUs, including those in high-performance computing applications. The company warns that these attacks could lead to information disclosure and potential data breaches.

  • AMD has warned of a new class of vulnerabilities called Transient Scheduler Attacks (TSA) affecting its CPUs.
  • TSA allows attackers to infer data from other contexts using timing information, potentially leading to unauthorized access to sensitive data.
  • Two variants of TSA have been identified: TSA-L1 and TSA-SQ, which pose significant security risks due to errors in the CPU's microarchitectural condition.
  • Successful attacks could lead to information leakage from the operating system kernel to user applications or between applications.
  • Exploiting TSA requires malicious access to a machine and running arbitrary code; conditions for exploitation are typically transitory.
  • AMD has released microcode updates to mitigate the risk, emphasizing the need for system administrators to keep their systems up-to-date and monitor for suspicious activity.



  • In a recent advisory, AMD warned of a new class of vulnerabilities affecting its CPUs, which collectively fall under the category known as Transient Scheduler Attacks (TSA). This announcement has sent shockwaves through the cybersecurity community, with many experts weighing in on the implications of these attacks.

    According to AMD, TSA is a type of speculative side channel that can be exploited by attackers to infer data from other contexts. The company attributes this vulnerability to a specific microarchitectural condition that can cause an attacker to use timing information to deduce sensitive information. In essence, TSA enables attackers to "peek" into the internal workings of a CPU's memory and cache systems, potentially leading to unauthorized access to sensitive data.

    The vulnerabilities were uncovered as part of a study by Microsoft and ETH Zurich researchers, who aimed to test modern CPUs against speculative execution attacks like Meltdown and Foreshadow. The researchers' findings revealed that AMD processors, including those in high-performance computing applications, were susceptible to these types of attacks.

    AMD has identified two variants of TSA: TSA-L1 and TSA-SQ, which are caused by errors in the way the L1 cache uses microtags for data-cache lookups and by a load instruction erroneously retrieving data from the CPU store queue when necessary data isn't yet available. Both variants pose significant security risks, as an attacker could potentially infer any data present within the L1 cache or used by an older store.

    In a worst-case scenario, successful attacks carried out using TSA-L1 or TSA-SQ flaws could lead to information leakage from the operating system kernel to a user application, from a hypervisor to a guest virtual machine, or between two user applications. This highlights the potential severity of these vulnerabilities and the need for immediate attention from system administrators and developers.

    However, it is essential to note that exploiting these flaws requires an attacker to possess malicious access to a machine and run arbitrary code. Furthermore, the conditions required to exploit TSA are typically transitory, as both the microtag and store queue will be updated after the CPU detects the false completion. This means that attackers would need to repeatedly create the conditions for false completion to exfiltrate data.

    To mitigate this risk, AMD has released microcode updates for impacted processors, which can help prevent exploitation of TSA vulnerabilities. It is crucial for system administrators to keep their systems up-to-date and monitor for any signs of suspicious activity.

    The discovery of TSA highlights the ongoing cat-and-mouse game between cybersecurity researchers and malicious actors. As our reliance on complex computer systems grows, so does the need for robust security measures. The development of more sophisticated attacks like TSA underscores the importance of staying vigilant and adapting to emerging threats.

    In conclusion, AMD's warning about Transient Scheduler Attacks is a stark reminder of the evolving landscape of cybersecurity threats. As we continue to push the boundaries of computing power and innovation, it is essential that we prioritize robust security measures to safeguard our digital assets.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/A-New-Class-of-Threats-AMD-Warns-of-Transient-Scheduler-Attacks-Impacting-a-Wide-Range-of-CPUs-ehn.shtml

  • https://thehackernews.com/2025/07/amd-warns-of-new-transient-scheduler.html


  • Published: Thu Jul 10 07:17:34 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us