The CPU can execute instructions transiently (being reverted before their results are committed to the architectural state), sometimes operating on secret operands they were not supposed to access. Traces of these executions can leak the secret values.
Description
The CPU can execute instructions transiently (being reverted before their results are committed to the architectural state), sometimes operating on secret operands they were not supposed to access. Traces of these executions can leak the secret values.CWE
CVE
Attack Surfaces
Speculation (MITRE EMB3D PID-11)
Attack Vectors
Speculative Execution (MITRE EMB3D TID-103)
Defenses
preventing speculation altogether, Disabling speculation in the hardware