Fact-checked by Grok 2 weeks ago

Foreshadow

Foreshadow is a family of speculative execution side-channel attacks targeting Intel processors, enabling attackers to disclose sensitive data from protected memory regions such as Intel Software Guard Extensions (SGX) enclaves, operating system kernels, virtual machines, and System Management Mode (SMM). The vulnerability, also known as L1 Terminal Fault (L1TF), exploits transient out-of-order execution during page table walks when accessing non-present L1 data cache (L1D) lines, allowing unauthorized reads across security boundaries like hypervisor isolation and SGX confidentiality guarantees. Discovered in early 2018 by independent research teams, Foreshadow was first reported to on January 3, 2018, by researchers from , and on January 23, 2018, by teams from Technion, the , the , and CSIRO's Data61. The attack was publicly disclosed at the Security Symposium in August 2018, where the original variant—dubbed Foreshadow—was detailed in the paper "Foreshadow: Extracting the Keys to the Intel SGX Kingdom" by Van Bulck et al. This initial attack primarily affects SGX-enabled processors from the Skylake (6th generation) and (7th generation) families, potentially extracting up to 4 KB of enclave secrets, including attestation keys that could compromise remote attestation in cloud environments. Subsequent variants expanded the attack's scope: Foreshadow-NG targets OS memory on non-SGX systems, affecting a broader range of Intel processors including 2nd to 8th generation Core i3/i5/i7/M, Scalable (Skylake-SP and Cascade Lake-SP), and certain processors. Foreshadow-VM undermines isolation by leaking data from other guests on the same , while Foreshadow-SMM breaches the highly privileged SMM to access secrets. Overall, the vulnerability impacts billions of Intel-based devices running vulnerable , with real-world exploitation requiring local attacker privileges but capable of extracting cryptographic keys, user data, and memory without detection. Mitigation involves a combination of CPU updates to prevent speculative L1D loads, operating system and patches to flush affected L1D contents on context switches, and mitigations in newer processors like Ice Lake (10th generation) and later. classified Foreshadow under CVE-2018-3615 (SGX), CVE-2018-3620 (OS/SMM), and CVE-2018-3646 (), recommending immediate updates to address performance-impacting but essential protections. While no widespread exploits were reported at disclosure in , in August 2025 researchers disclosed L1TF Reloaded, a combined attack bypassing software mitigations to leak data in public clouds like AWS and Google Cloud. Foreshadow highlighted ongoing risks in , influencing subsequent defenses like Intel's L1D eviction policies.

Overview

Description and Naming

Foreshadow is a class of speculative execution side-channel vulnerabilities affecting Intel processors, enabling attackers to leak sensitive data across security boundaries by exploiting transient faults during L1 data cache (L1D) accesses. Specifically, it targets scenarios where the processor speculatively executes instructions on data from unmapped or invalid memory pages, allowing unauthorized access to protected regions such as Intel Software Guard Extensions (SGX) enclaves, operating system kernels, virtual machines (VMs), and System Management Mode (SMM) environments. This transient execution attack leverages the processor's out-of-order execution to bypass isolation mechanisms, potentially exposing cryptographic keys, user data, or hypervisor secrets. Intel officially designates Foreshadow as L1 Terminal Fault (L1TF), emphasizing the role of the in the fault mechanism. The encompasses multiple variants, each assigned a distinct (CVE) identifier: CVE-2018-3615 for the SGX-related attack, CVE-2018-3620 for the OS kernel and SMM variant, and CVE-2018-3646 for the VM cross-hypervisor exploitation. These designations highlight the attack's ability to undermine fundamental hardware-enforced protections in modern computing systems. The name "Foreshadow" was coined by the discovering researchers from imec-DistriNet at , Technion, the , the , and CSIRO's Data61, drawing from the literary term "" to illustrate how the vulnerability subtly hints at and enables the reconstruction of confidential data through paths. This nomenclature underscores the attack's insidious nature, where seemingly innocuous foreshadows broader risks.

Variants

The Foreshadow vulnerability encompasses several variants, each exploiting the L1 Terminal Fault (L1TF) to target distinct privileged memory regions in Intel processors, though they differ in their required privilege escalation paths and scopes. The original Foreshadow attack specifically targets Intel Software Guard Extensions (SGX) enclaves, enabling an attacker with access to an untrusted OS or hypervisor to extract up to 4 KB of enclave data per attack, including cryptographic keys used for attestation and sealing. This variant, assigned CVE-2018-3615, undermines SGX's confidentiality guarantees by leaking secrets from production enclaves, such as the 128-bit launch and attestation keys, potentially allowing forged remote attestations. Foreshadow-NG extends the attack to broader system components, breaking isolation to access unauthorized physical memory not mapped in the attacker's . One variant, Foreshadow-OS (CVE-2018-3620), focuses on operating system memory leakage, permitting unprivileged user applications to read data and compromise between user-mode applications. This includes potential access to (SMM) protected regions under the same CVE, where firmware-level code executes in a highly privileged environment, thus threatening low-level system . Another Foreshadow-NG variant targets virtual machines, known as Foreshadow-VMM (CVE-2018-3646), allowing a malicious VM to breach isolation and read from the host OS, other guest VMs, or SMM regions. This poses significant risks in environments, enabling cross-VM without privileges. While all variants leverage the same underlying L1TF fault, they diverge in escalation requirements: the original necessitates SGX enclave entry, whereas Foreshadow-OS relies on user-kernel gaps, and Foreshadow-VMM exploits guest-host boundaries. These distinctions highlight Foreshadow's versatility in subverting layered hardware protections.

Background

Speculative Execution in CPUs

is a performance optimization technique in modern central processing units (CPUs) where instructions are predicted and executed ahead of their definitive resolution, particularly for branch instructions, to minimize stalls and enhance overall throughput. This approach relies on , allowing the CPU to process subsequent instructions while awaiting confirmation of decisions, thereby increasing (). Key components enabling include branch prediction mechanisms, such as the Branch Target Buffer (BTB), which forecast the direction and target of branches to guide instruction fetching. The (ROB) plays a crucial role by maintaining a queue of in-flight instructions in program order, enabling the CPU to commit results only after speculation is verified correct; if a misprediction occurs, the ROB facilitates squashing of transient execution states to restore architectural consistency. These transient states represent temporary computations that are discarded upon misprediction but can still influence microarchitectural elements during their brief lifetime. In , the L1 data serves as the primary, lowest-latency storage for frequently accessed data, accelerating load operations during predicted instruction paths. However, this 's proximity to the execution makes it susceptible to alterations from transient states, where speculative loads may populate cache lines before a fault or misprediction invalidates the . Speculative execution was first introduced in processors with the in 1995, marking a shift to superscalar out-of-order designs that incorporated dynamic and to overcome limitations of in-order pipelines. This technique has evolved significantly, with modern cores like Skylake (introduced in 2015) enhancing accuracy and capacity to achieve significant improvements over prior generations in branch-intensive workloads.

Relevant Intel Technologies

Intel Software Guard Extensions (SGX) is a set of CPU instructions that enable the creation and execution of hardware-protected enclaves, allowing sensitive code and data to run in isolated memory regions shielded from the operating system, hypervisor, or other privileged software. Enclave memory employs abort page semantics, where unauthorized accesses return a deterministic value (such as -1 for loads) after passing initial page table checks, ensuring architectural isolation while relying on the processor's memory encryption engine to safeguard data in caches and DRAM. This design protects against software attacks but exposes enclave contents in processor caches during speculative execution. Intel Virtualization Technology (VT-x) facilitates efficient execution by introducing two modes: VMX root operation for the host (e.g., ) and VMX non-root operation for guests. It employs Extended Page Tables (EPT) to map guest physical addresses to host physical addresses, enforcing isolation between virtual machines and the host through nested paging structures. EPT violations trigger faults that interrupt address translation, but can transiently access underlying physical memory before fault resolution, potentially bridging guest-host boundaries. System Management Mode (SMM) operates as a highly privileged execution environment in processors, activated via System Management Interrupts (SMI) to handle low-level system tasks such as and hardware error correction. SMM code executes in a dedicated (SMRAM) that is isolated from OS and application access, with all logical cores required to during entry and exit to maintain confidentiality. This mode leverages the processor's capabilities for performance, placing SMM data in shared L1 caches vulnerable to transient leaks across privilege levels. Page fault handling in Intel x86 processors occurs when a memory access violates paging rules, such as referencing a non-present page or exceeding access permissions, generating a #PF exception (vector 14). The processor stores the faulting linear address in CR2 and pushes an onto the detailing the violation type (e.g., not present, write-protected), after which control transfers to the OS handler via the . Microarchitecturally, during address translation walks, speculative loads may temporarily populate the L1 data with faulting data before the fault is recognized and resolved, leading to eviction of that data upon aborting the speculation. This process integrates with broader mechanisms to maintain performance while enforcing eventual architectural correctness.

History

Discovery

The discovery of Foreshadow emerged from collaborative research efforts spanning 2017 and 2018, involving teams from imec-DistriNet at in , the Technion in , the University of Michigan in the United States, the University of Adelaide in , and CSIRO's Data61. These researchers independently identified the vulnerability through systematic exploration of Intel's (SGX), a hardware-based security feature designed to protect sensitive code and data in isolated enclaves. The team first uncovered the issue and notified Intel on January 3, 2018, while the other collaborators reported their concurrent findings during the subsequent embargo period on January 23, 2018. The initial hypothesis driving the investigation stemmed from the early 2018 disclosures of speculative execution vulnerabilities like Meltdown and Spectre, which revealed how transient out-of-order execution in modern CPUs could leak privileged data across security boundaries. Motivated by these revelations, the researchers hypothesized that similar flaws might undermine SGX's intra-address-space isolation, potentially allowing enclave secrets to be extracted via microarchitectural side channels without kernel privileges or knowledge of the victim's code. This probe focused on Intel processors supporting SGX, examining how speculative execution interacts with enclave memory protection mechanisms. A pivotal breakthrough came with the development of a novel exploitation technique using transient to inject faults into the L1 , enabling the leakage of arbitrary enclave memory contents. As a proof-of-concept, the team demonstrated the attack by extracting private keys from SGX-protected cryptographic operations, confirming the vulnerability's ability to compromise even vetted architectural enclaves like Intel's attestation services. This L1 -based approach marked the first practical software-only method to dismantle SGX's core security guarantees, highlighting risks to millions of affected devices. The findings were detailed in the seminal paper "Foreshadow: Extracting the Keys to the SGX Kingdom with Transient ," authored by Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Yuval Yarom, Raoul Strackx, Thomas F. Wenisch, and Mark Silberstein, and presented at the 27th Security Symposium in August 2018. This publication established Foreshadow as a high-impact contribution to microarchitectural security research, influencing subsequent mitigations for flaws.

Disclosure Timeline

The Foreshadow vulnerability was responsibly disclosed to by researchers from on January 3, 2018, following standard practices for coordinating with the affected vendor. A second independent research team from institutions including Technion, the , the , and CSIRO's Data61 reported their findings to on January 23, 2018, during the ongoing embargo period. acknowledged the severity of the issue, assigning it CVE-2018-3615 for the core SGX-related variant, and began developing mitigations in collaboration with the researchers. In preparation for public release, distributed updates to OEMs and system vendors starting around May to June to address the vulnerability ahead of disclosure. The full public reveal occurred on August 14, , coinciding with the presentation of the seminal at the Security Symposium and the issuance of Intel's security advisory INTEL-SA-00161, which detailed the L1 Terminal Fault (L1TF) family of issues. Patch rollout followed swiftly, with operating system-level mitigations integrated into major platforms. included Foreshadow protections in its August 2018 Patch Tuesday updates for Windows, while patches addressing the were upstreamed around the same time and distributed via major distributions shortly thereafter; some full ecosystem integrations extended into 2018. Subsequent variants, collectively termed Foreshadow-NG (CVEs 2018-3620 and 2018-3646), which extended the to operating system kernels, hypervisors, and virtual machines, were disclosed simultaneously with the original vulnerability in August 2018 as part of the same research and advisory. As of 2025, no major in-the-wild exploits leveraging Foreshadow or its variants have been reported, with industry focus shifting to ongoing monitoring and verification of mitigations across affected hardware.

Mechanism

Core Vulnerability

The core vulnerability in Foreshadow, known as L1 Terminal Fault (L1TF), stems from a flaw in Intel CPUs' handling of speculative execution for load instructions accessing protected memory regions. During transient out-of-order execution, the processor speculatively fetches data from physical memory addresses corresponding to page table entries (PTEs) marked as non-present (i.e., invalid PTEs where the present bit is cleared), bypassing the standard page fault checks that would normally prevent such access. This allows forbidden data—such as kernel pages or enclave secrets—to be loaded into the L1 data cache before the fault is detected and the speculation is squashed. Upon detecting the , the is squashed, but the transiently loaded data remains in the L1 data because the process does not invalidate the affected lines. This allows the leaked data to be accessible via side-channel attacks, with remnants potentially lingering in the 64-byte lines. At the bit level, L1TF enables the leakage of up to 512 bits (equivalent to one full 64-byte L1 line) per , as the entire line is populated during the mis-speculated load. This relies on prerequisites inherent to transient execution, including the attacker's ability to trigger mis-speculated loads targeting protected memory regions, such as those marked non-present in the page tables, while ensuring the data resides in or is fetched into the L1 (as L2 cache data cannot be similarly accessed).

Exploitation Techniques

Exploitation of the L1 Terminal Fault (L1TF), also known as Foreshadow, begins with triggering speculative execution to access protected memory regions. Attackers induce terminal faults by attempting to load data from unmapped or permission-violating logical addresses, such as through system calls like mmap to map invalid pages or by clearing page table entry (PTE) present bits, which provokes a page fault during memory access. In virtualized environments, extended page table (EPT) violations can be triggered by manipulating guest page tables to bypass walks and access host memory speculatively. This fault handling gap allows the processor to transiently execute out-of-order loads, populating the L1 data cache (L1D) with unauthorized data before the fault is resolved and the speculation is squashed. Once is speculatively loaded into the L1D , attackers extract it via side-channel attacks that measure state changes. The Flush+Reload technique is commonly employed, where the attacker flushes lines using instructions like clflush, then reloads them and times the access to infer whether a specific byte was cached during . This exploits the L1D's low for hits (around 4 cycles) versus misses, enabling reconstruction of leaked byte-by-byte by probing occupancy for each possible value. Malicious user-space code can initiate these probes without elevated privileges, provided the attacker has local code execution on the same physical machine. Proof-of-concept implementations demonstrate practical feasibility, such as repeatedly speculating loads to extract up to 4 KB of data from a protected enclave, achieving approximately 97% success rate on a Skylake CPU ( i7-6700). These exploits rely on iterative fault induction and side-channel measurements to recover contiguous memory blocks, with success depending on factors like contention and depth. Exploiting L1TF requires a local attacker with code execution on the target machine, typically in user space without needing administrative privileges for the basic operating system . However, targeting enclaves demand initial compromise or co-location within the protected domain to initiate effectively.

Affected Systems

Hardware

The Foreshadow vulnerability, also known as L1 Terminal Fault (L1TF), affects processors featuring microarchitectures that allow to access data in the L1 data cache (L1D) despite invalid entries, enabling potential leakage of sensitive information across security boundaries. Vulnerable microarchitectures include Haswell, Broadwell, Skylake, , , , , and , among others, due to their virtually indexed, physically tagged L1D cache design combined with speculative walks. Affected processor families span several generations of Intel products released primarily from 2012 to 2021, before full hardware mitigations were universally implemented. The following summarizes key affected families, focusing on representative generations and models:
FamilyAffected Generations/MicroarchitecturesExamples
6th to 11th Gen (Skylake to , excluding mitigated microarchitectures like Sunny Cove in 10th Gen Ice Lake)6th Gen (Skylake S/H), 7th Gen ( S/U/Y), 8th Gen (, ), 9th Gen ( Refresh), 10th Gen ( S/H/U), 11th Gen ( S)
E3/E5/E72012–2018 (Ivy Bridge to ) E3 v2/v3/v4/v5/v6 (Ivy Bridge to Skylake), E5 v2/v3/v4 (Ivy Bridge to Broadwell), E7 v2/v3/v4
Scalable1st Gen (Skylake-SP, 2017), 2nd Gen partial (-SP pre-mitigation, 2019)Skylake-SP (06_55H), early variants
Broadwell-DE to Skylake-D (2015–2019)-1500/2100 series (Broadwell, Skylake)
Select series (2016–2019)Apollo Lake (E3900), Denverton (C3000)
Select models (2012–2018)Knights Landing (partial implementations)
Note: Within generations, some models (e.g., 10th Gen Ice Lake based on Sunny Cove) include hardware mitigations and are non-vulnerable if the RDCL_NO bit is set. These implementations are vulnerable because they lack built-in hardware barriers to prevent speculative loading of L1D cache lines from non-present or paging structures, a flaw rooted in the microarchitectural optimization for performance. Many processors released after 2019 incorporate hardware mitigations that render them non-vulnerable to L1TF, particularly those based on microarchitectures starting from Sunny Cove (e.g., Ice Lake and later generations like , ). However, some refresh-based processors, such as 11th Gen , remain vulnerable and require and software mitigations. and ARM-based processors are unaffected, as the vulnerability stems from specific microarchitectural behaviors in handling page faults during . As of November 2025, provides microcode updates for all affected processors, and major operating systems implement full mitigations by default, rendering exploitation unlikely on updated systems. Detection of L1TF status on a given processor involves querying the instruction to identify the family, model, and stepping (e.g., via leaf 0x1 for basic info and leaf 0x7 for extended features), followed by checking the IA32_ARCH_CAPABILITIES (MSR 0x10A) for bit 1 (RDCL_NO), which indicates hardware mitigation against L1TF if set; this MSR is accessible only if supported, as enumerated by leaf 0x7, subleaf 0, ECX bit 29. Tools like operating system utilities or 's microcode verification can confirm the presence of required updates.

Software and Environments

Foreshadow, also known as L1 Terminal Fault (L1TF), impacts a range of operating systems running on vulnerable processors, particularly through its Foreshadow-NG variant that enables unprivileged user-space applications to access on unpatched systems. Affected platforms include and later versions, starting from version 4.0, and macOS, where the vulnerability allows potential leakage of sensitive data such as passwords or encryption keys. In these environments, the attack exploits transient execution to read data from the processor's L1 data , bypassing standard mechanisms like . Virtualization platforms amplify the risks of Foreshadow in multi-tenant setups, with the Foreshadow-VMM (CVE-2018-3646) enabling malicious machines to hypervisor memory and data from other co-located VMs on unpatched hosts. Key affected hypervisors include , , and KVM-based solutions, where shared hardware resources facilitate cross-VM attacks. In cloud environments such as AWS EC2 and VMs, this can lead to between tenants, as the leverages the same L1 sharing on multi-core servers. Applications utilizing face the most severe threats from the Foreshadow-SGX variant (CVE-2018-3615), which dismantles enclave isolation by extracting secrets like sealing and remote attestation keys from protected memory. is commonly employed in scenarios requiring high-assurance confidentiality, such as (DRM) in Blu-ray players and the Netflix client, secure computation in messaging protocols like Open Whisper Systems' , and blockchain applications including wallets that rely on hardware-enforced enclaves for key protection. On unpatched systems, these deployments risk complete compromise of enclosed data, undermining 's core promise of trusted execution. In browser-based environments, Foreshadow poses risks on vulnerable hosts running or , where code in unprivileged contexts could potentially trigger the attack to access or enclave data, though browser sandboxes significantly constrain the exploit's reach compared to native applications.

Impact

Security Consequences

The Foreshadow vulnerability, also known as L1 Terminal Fault (L1TF), enables attackers to extract sensitive data from Intel SGX enclaves by exploiting to access L1 data cache contents that should be isolated. Specifically, it allows the leakage of up to 4KB of enclave memory per attack, including critical assets such as 2048-bit private keys, user passwords, and SGX attestation reports that verify enclave . This breach compromises the guarantees of SGX, which is designed to protect code and data in trusted execution environments against even privileged software like the operating system or . In practical attack scenarios, a malicious could steal secrets or data from co-located virtual machines, violating in multi- environments such as public . Similarly, running in user space might extract credentials or (SMM) data, escalating privileges to access protected memory regions. These capabilities break the fundamental model, where virtual machines are expected to remain isolated from each other and the host. The broader implications of Foreshadow severely undermine trust in SGX for applications, such as secure in services relying on hardware enclaves, potentially enabling the creation of forged attestations that deceive remote parties about enclave authenticity. This erosion extends to the overall ecosystem, as it exposes flaws in hardware-enforced that developers and providers have relied upon for secure multi-tenant deployments. As of November 2025, no Foreshadow exploits have been observed in the wild, though the vulnerability poses a high theoretical risk to unpatched legacy systems still using affected Intel processors like Skylake and Kaby Lake generations. However, in August 2025, researchers disclosed "L1TF Reloaded," a new attack variant combining L1TF with Spectre-like techniques to bypass mitigations and leak VM data in public clouds, underscoring persistent vulnerabilities in unpatched or incompletely mitigated systems. Its complexity limits immediate real-world deployment compared to simpler attack vectors, but persistent exposure in outdated infrastructure heightens long-term concerns for sectors dependent on SGX, such as financial and healthcare computing.

Performance Considerations

The execution of a Foreshadow attack introduces measurable overhead, primarily during the data extraction phase, where repeated speculative executions are required to reliably leak information. Extracting a full 4 KB page requires repeating the attack thousands of times across all possible byte values to reliably leak the data via the covert channel, resulting in noticeable CPU overhead for the attacking process due to the intensive trial-and-error nature of cache probing and recovery. Mitigations for Foreshadow, also known as L1 Terminal Fault (L1TF), impose varying performance costs depending on the implementation and environment. patches from , which prevent speculative access to invalid entries, typically result in 1-5% loss in () across general workloads, with bare-metal systems experiencing ≤1% overall impact in benchmarks like SPECfp2017 and . In virtualized setups, operating system mechanisms akin to isolation (PTI) can increase (TLB) misses by up to 30%, exacerbating latency in memory-intensive scenarios due to frequent flushes on switches. Benchmark results on Skylake processors highlight these effects, showing a 2-10% drop in throughput for unmitigated versus mitigated configurations in database workloads, such as those measured with SPECjbb, where multithreaded applications see up to 4% slowdown. In virtualized environments, the impact is amplified, with reports of 10-30% performance reduction when is disabled or side-channel-aware scheduling is enforced to isolate guest , particularly affecting web servers and high-density VPS deployments. Long-term hardware solutions in CPUs released post-2019, such as Intel's and subsequent generations, incorporate built-in L1TF mitigations that eliminate the need for software flushes, yielding negligible overhead compared to earlier software-only approaches—often under 1% across enterprise workloads.

Mitigation

Immediate Fixes

In response to the Foreshadow vulnerability, also known as L1 Terminal Fault (L1TF), released microcode updates in August 2018 that modify processor operations to implicitly clear sensitive data from the L1 data cache (L1D) during context switches and other speculative events, thereby preventing unauthorized speculative access. These updates are deployed through firmware from original equipment manufacturers (OEMs) or via operating system loaders, such as the intel-microcode package in distributions, which includes specific patches like those targeting SGX enclaves to block L1TF exploitation in secure environments. At the operating system level, immediate mitigations focus on configuring parameters to enforce L1D flushing and restrict speculative loads from protected memory regions. In , setting the boot parameter l1tf=full activates comprehensive protection by clearing the L1D on every (VM) entry and ensuring that user-space pages are not speculatively loaded into the , applicable across affected distributions like and . For Windows, mitigations are enabled through registry modifications under HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management, using keys such as FeatureSettingsOverride (set to 72 or 0x48 with enabled, or 8264 or 0x2048 with it disabled) and FeatureSettingsOverrideMask (set to 3 or 0x3) to activate L1TF protections alongside broader safeguards, as detailed in Microsoft's security updates. Hypervisor configurations provide targeted fixes for virtualized environments, emphasizing isolation between guest . addresses L1TF through Extended Page Tables (EPT) hardening in its vSphere updates, which invalidate speculative EPT entries to prevent cross-VM data leakage, enabled by default in patches from VMSA-2018-0020 and configurable via advanced settings like VMkernel.Boot.hyperthreadingMitigation=true for enhanced concurrent-context protection. In KVM-based setups, while also recommending L1D flushing on VM entry via kvm-intel.vmentry_l1d_flush=cond. For high-security , disabling at the level or via hypervisor options fully eliminates the shared core vulnerability exploited by L1TF, as it prevents intra-core attacks without relying solely on software flushes. Detection and verification tools assist in confirming mitigation deployment. Intel provides analysis guidance and recommends scripts like the open-source spectre-meltdown-checker to assess L1TF exposure, which evaluates microcode versions and kernel configurations for completeness. In Linux, kernel parameters such as reading /sys/devices/system/cpu/vulnerabilities/l1tf report the current status (e.g., "Mitigation: PTE Inversion; VMX: conditional cache flushes"), allowing administrators to verify full protection without performance regressions from incomplete setups.

Long-term Solutions

To address the Foreshadow vulnerability (also known as L1 Terminal Fault or L1TF) in a sustainable manner, introduced hardware-level mitigations in subsequent processor generations, fundamentally altering the mechanisms that enable the attack. Starting with the family of Scalable processors released in 2019, implemented silicon-based changes to the handling and permission check processes, preventing unauthorized speculative access to L1 cache contents, including those protected by SGX enclaves. These modifications ensure that transient cannot from invalid or privileged regions, such as SGX-protected areas, without the performance overhead of software-only defenses. Later processor architectures, including Ice Lake (2019) and subsequent generations like (2020) and (2021), build on these fixes with enhanced isolation for paths and integrated protections against related side-channel vulnerabilities, such as variants. This approach prioritizes redesigning the to enforce stricter bounds on , particularly for SGX, where enclave entry and exit now include hardware-enforced cache flushes and isolation to block cross-core data leakage. As a result, systems upgraded to these processors are inherently resistant to Foreshadow without requiring ongoing patches, though full protection still necessitates compatible and OS configurations. As of August 2025, researchers demonstrated "L1TF Reloaded," an exploit bypassing some software mitigations in public cloud environments like AWS and Google Cloud, but hardware protections in post-Cascade Lake processors remain effective when combined with current and OS updates. For environments relying on SGX, long-term resilience also involves adopting updated enclave designs that leverage these hardware features, such as restricting execution to single-threaded modes on Hyper-Threaded cores and incorporating constant-time algorithms to mitigate residual timing side channels. Intel's ongoing evolution of SGX in post-Cascade Lake CPUs further emphasizes verifiable attestation and sealed key management to prevent key extraction attacks like Foreshadow-SGX, ensuring that remains viable against speculative exploits.

References

  1. [1]
    Foreshadow: Breaking the Virtual Memory Abstraction with Transient ...
    Foreshadow is a speculative execution attack on Intel processors that can steal sensitive data, including from SGX-protected memory, and even from other VMs.
  2. [2]
    [PDF] Extracting the Keys to the Intel SGX Kingdom with Transient Out-of ...
    This paper shows, however, that current SGX implementations cannot meet their security objectives. We present the Foreshadow attack, which leverages a ...
  3. [3]
    [PDF] Breaking the Virtual Memory Abstraction with Transient Out-of-Order ...
    Aug 14, 2018 · In January 2018, we discovered the Foreshadow transient execution attack (USENIX Security'18) targeting Intel. SGX technology.
  4. [4]
    INTEL-SA-00161
    Researchers have identified a speculative execution side-channel method called L1 Terminal Fault (L1TF). This method impacts select microprocessor products.
  5. [5]
    L1 Terminal Fault / CVE-2018-3615, CVE-2018-3620,... - Intel
    Aug 14, 2018 · L1 Terminal Fault occurs when a program accesses unmapped memory, potentially allowing side-channel access to the L1 data cache, which can be ...
  6. [6]
    Foreshadow: Extracting the Keys to the Intel SGX Kingdom with ...
    We present Foreshadow, a practical software-only microarchitectural attack that decisively dismantles the security objectives of current SGX implementations.Missing: original | Show results with:original
  7. [7]
    [PDF] Intel Analysis of Speculative Execution Side Channels
    The concept behind speculative execution is that instructions are executed ahead of knowing that they are required. Without speculative execution, the processor ...
  8. [8]
    [PDF] Exploiting Speculative Execution - Spectre Attacks
    We have empirically verified the vulnerabil- ity of several Intel processors to Spectre attacks, including. Ivy Bridge, Haswell, Broadwell, Skylake, and Kaby ...Missing: IPC | Show results with:IPC
  9. [9]
    Hardware Features and Behaviors Related to Speculative Execution
    Sep 13, 2024 · Branch Target Buffer (BTB) predicts indirect branch target address based on the branch instruction's address. Other branch predictors predict ...
  10. [10]
    A 56-entry instruction reorder buffer - IEEE Xplore
    A speculative execution high-end PA-RISC CPU has two 28-entry out-of-order instruction reorder buffers (IRBs), one for alu/floating point operations and one ...
  11. [11]
    Intel Analysis of Speculative Execution Side Channels
    May 25, 2021 · This white paper provides information on various side channel methods, as well as the mitigations that Intel is pursuing for each.
  12. [12]
    Understanding L1 Terminal Fault aka Foreshadow - Red Hat
    Aug 14, 2018 · L1 Terminal Fault (L1TF) is when a page table entry is found 'not present' during a page table walk, often because the OS has swapped a page ...
  13. [13]
    Skylake: Intel's Longest Serving Architecture - Chips and Cheese
    Oct 14, 2022 · To keep Skylake in the game, Intel made improvements on multiple fronts. 14 nm process tweaks extended the power/performance curve, while ...
  14. [14]
    [PDF] Extracting the Keys to the Intel SGX Kingdom with Transient Out-of ...
    Aug 15, 2018 · We present the Foreshadow attack, which leverages a speculative execution bug in recent Intel x86 processors to reliably leak plaintext enclave ...
  15. [15]
    [PDF] A Systematic Evaluation of Transient Execution Attacks and Defenses
    Aug 14, 2019 · Flushing the cache is also done upon exiting System Management Mode (SMM) to mitigate Foreshadow-NG attacks on SMM. To mitigate attacks across ...
  16. [16]
    None
    Below is a merged summary of page faults (#PF exception) in Intel x86 CPUs, consolidating all the information from the provided segments into a single, comprehensive response. To maximize density and clarity, I’ve organized key details into tables where appropriate, while retaining narrative explanations for handling processes and microarchitectural behaviors. All relevant quotes, section locations, page numbers, and URLs are included.
  17. [17]
    Foreshadow: the fifth major CPU security flaw discovered in 2018
    Aug 14, 2018 · Intel has rated Foreshadow as 'high severity' and confirmed that the flaw affects all SGX-enabled Core processors, while Intel Atom CPUs are ...<|separator|>
  18. [18]
    Researchers Disclose New Foreshadow (L1TF) Vulnerabilities ...
    Aug 14, 2018 · According to the research team behind the L1TF/Foreshadow flaws, only Intel CPUs are affected. Researchers contacted Intel earlier this year and ...<|control11|><|separator|>
  19. [19]
    ​Microsoft: Here's how to limit 'Foreshadow' attack impact | ZDNET
    Aug 15, 2018 · Windows Server admins using Hyper-V have some complicated choices to make about how best to mitigate Foreshadow on Intel hardware.
  20. [20]
    Challenges with the Foreshadow Vulnerability - ARIA Cybersecurity
    Aug 29, 2018 · Researchers in Belgium originally alerted Intel to this flaw, initially dubbed Foreshadow NG. Intel subsequently discovered an additional ...
  21. [21]
    VU#982149 - Intel processors are vulnerable to a speculative ...
    Aug 15, 2018 · Intel processors are vulnerable to one or more L1 data cache information disclosure and terminal fault attacks via a speculative execution ...Missing: timeline | Show results with:timeline
  22. [22]
    Affected Processors: Transient Execution Attacks & Related Security...
    Review the impact of transient execution attacks and select security issues on currently supported Intel products.
  23. [23]
  24. [24]
    L1 Terminal Fault Vulnerability - Cyberus Technology
    Aug 14, 2018 · Affected software: So far all versions of all operating systems (Microsoft Windows, Linux, MacOS, BSDs, …) All hypervisors (Microsoft HyperV ...
  25. [25]
    'Foreshadow' Flaw Undermines the Intel CPU Secure Enclave
    Aug 14, 2018 · A team of researchers has found a Spectre-like vulnerability that specifically undermines the most secure element of recent Intel chips.
  26. [26]
    Intel Publishes L1TF and Foreshadow Performance Impacts
    Aug 20, 2018 · Foreshadow utilized a level 1 cache terminal fault (hence L1TF) as a side channel vector attack. There were a few major implications of ...
  27. [27]
    L1 Terminal Fault - Intel
    Aug 14, 2018 · Refer to the consolidated list of Affected Processors (2018-2021 tab, L1 Terminal Fault column) for a list of currently supported processors ...
  28. [28]
    Performance considerations for L1 Terminal Fault
    Jul 11, 2025 · The majority of the workloads showed little to no impact. Several large multithreaded applications, like SPECjbb, showed an up to 4% slowdown.
  29. [29]
    Analysis and mitigation of L1 Terminal Fault (L1TF) - Microsoft
    Aug 13, 2018 · L1TF arises due to a CPU optimization related to the handling of address translations when performing a page table walk. When translating a ...Missing: leaf 0x7 20
  30. [30]
    L1TF - L1 Terminal Fault Attack - CVE-2018-3620 & CVE-2018-3646
    Aug 14, 2018 · There are three pieces to this vulnerability. The first affects only Intel “SGX” secure enclaves and is mitigated through microcode updates ...
  31. [31]
    L1TF - L1 Terminal Fault - The Linux Kernel documentation
    This vulnerability affects a wide range of Intel processors. The vulnerability is not present on: Processors from AMD, Centaur and other non Intel vendors.
  32. [32]
    Windows guidance to protect against speculative execution side ...
    This article describes how to mitigate the following vulnerabilities: CVE-2018-3620 | L1 Terminal Fault – OS, SMM. CVE-2018-3646 | L1 Terminal Fault – VMM.Missing: Foreshadow- | Show results with:Foreshadow-
  33. [33]
  34. [34]
    speed47/spectre-meltdown-checker - GitHub
    Spectre & Meltdown Checker. A shell script to assess your system's resilience against the several transient execution CVEs that were published since early ...Spectre & Meltdown Checker · Easy Way To Run The Script · Example Of Script Output
  35. [35]
    Intel's SGX blown wide open by, you guessed it, a speculative ...
    Aug 14, 2018 · A new Meltdown-inspired attack on Intel's SGX, given the name Foreshadow by the researchers who found it.
  36. [36]
    The Combined Impact Of Mitigations On Cascade Lake Following ...
    Nov 24, 2019 · Keep in mind Cascade Lake has hardware mitigations in place for L1TF, Meltdown, and some Spectre protections. The different configurations ...
  37. [37]
    Project Rain:L1TF - Google Bug Hunters
    Sep 19, 2025 · This blog shares a detailed overview of the L1TF vulnerability, a CPU vulnerability on some Intel CPUs (Skylake and older), and explains how ...