Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2020-28368 : Security Advisory and Response

Learn about CVE-2020-28368, a Xen vulnerability allowing guest OS administrators to access sensitive data via a side-channel attack. Find mitigation steps and preventive measures here.

Xen through 4.14.x allows guest OS administrators to obtain sensitive information via a side-channel attack on a power/energy monitoring interface, known as a 'Platypus' attack.

Understanding CVE-2020-28368

Xen vulnerability allowing guest OS administrators to access sensitive data through a side-channel attack.

What is CVE-2020-28368?

        Xen vulnerability in versions up to 4.14.x
        Exploitable by guest OS administrators
        Enables access to sensitive information like AES keys
        Attack conducted through a power/energy monitoring interface

The Impact of CVE-2020-28368

        Guest OS administrators can extract confidential data
        Potential compromise of encryption keys
        Threat of unauthorized access to critical information

Technical Details of CVE-2020-28368

Xen vulnerability enabling unauthorized access to sensitive data.

Vulnerability Description

        Xen through 4.14.x susceptible to side-channel attacks
        Exploitable by guest OS administrators
        Vulnerability named 'Platypus' attack

Affected Systems and Versions

        Xen versions up to 4.14.x
        Guest OS environments

Exploitation Mechanism

        Side-channel attack on power/energy monitoring interface
        Allows extraction of sensitive information

Mitigation and Prevention

Protect systems from CVE-2020-28368 to enhance security.

Immediate Steps to Take

        Apply patches and updates from Xen
        Monitor for any unauthorized access
        Implement access control measures

Long-Term Security Practices

        Regular security audits and assessments
        Educate users on data security best practices
        Employ encryption for sensitive data

Patching and Updates

        Install Xen updates promptly
        Follow security advisories from Xen
        Monitor for any new developments or patches

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now