Downfall: Single Instruction Multiple Data Leaks in Cutting-edge CPUs
This talk demonstrates the Downfall vulnerability, a microarchitectural side-channel attack that exploits the Gather instruction in Intel CPUs to leak sensitive data from internal CPU buffers. The attack targets the vector register file, allowing an attacker to steal encryption keys and arbitrary data from other processes, virtual machines, or even secure enclaves like Intel SGX. The researcher provides a proof-of-concept showing how to bypass existing mitigations and extract cryptographic material. The presentation concludes with a discussion on the limitations of current microcode-based mitigations and the performance impact of these fixes.
Exploiting the Gather Instruction: How Downfall Bypasses CPU Security Boundaries
TLDR: The Downfall vulnerability, tracked as CVE-2022-40982, allows attackers to leak sensitive data from internal CPU buffers by exploiting the Gather instruction. This side-channel attack can extract cryptographic keys and arbitrary data from other processes, virtual machines, and even secure enclaves like Intel SGX. Security researchers and penetration testers should prioritize identifying systems running vulnerable Intel processors and verify that microcode mitigations are active, despite the potential performance overhead.
Hardware-level vulnerabilities are the ultimate "game over" for software-based security. When the silicon itself leaks data, your kernel-level protections, sandboxing, and even hardware-backed enclaves become effectively transparent. The Downfall research presented at Black Hat 2023 is a masterclass in how microarchitectural optimizations—specifically those designed to speed up data processing—can be weaponized to bypass fundamental isolation boundaries.
The Mechanics of the Gather Instruction
At the heart of this vulnerability is the Gather instruction, part of the AVX2 and AVX-512 instruction sets. Introduced to accelerate data-intensive tasks like database lookups and scientific computing, Gather allows a CPU to load scattered data from memory into a vector register in a single operation. To make this process fast, Intel CPUs use internal buffers to temporarily store data before it is mapped to the software-accessible register file.
The vulnerability arises because these internal buffers are shared across different execution contexts on the same physical core. When a Gather instruction executes, the CPU speculatively loads data into these buffers. If an attacker can trigger a fault or a specific microcode assist, they can force the CPU to leak the stale data remaining in these buffers from a previous operation. Because these buffers are not properly cleared between context switches, an attacker running a malicious thread on the same physical core can sample the data left behind by a victim thread.
From Theory to Key Extraction
The research demonstrates a practical attack flow that is surprisingly straightforward for a side-channel exploit. An attacker first puts the CPU into a speculative execution state by triggering a cache miss. Once the CPU is in this state, the attacker executes a Gather instruction to sample the contents of the internal buffers. By repeating this process, the attacker can reconstruct the data bit by bit.
The most alarming part of this research is the ability to extract cryptographic keys. In the provided proof-of-concept, the researcher targets an OpenSSL process performing AES encryption. Because the AES algorithm expands a master key into round keys, these keys are frequently loaded into the CPU registers. By timing the execution and sampling the buffers, the attacker can recover the round keys and, subsequently, the master key.
# Example of the attack targeting an OpenSSL process
openssl aes-128-cbc -salt -e -in /dev/urandom -out /dev/null -K $key
The researcher’s tool, which leverages the sgx-step framework, allows for instruction-level control over the victim process. By using SGX-STEP to interrupt the enclave at precise moments, the attacker can force the CPU to leak the specific registers containing the sealing key. Once the sealing key is compromised, the entire security model of the Intel SGX enclave collapses.
Real-World Applicability for Pentesters
For those of us in the field, Downfall changes the threat model for multi-tenant environments. If you are performing a penetration test on a cloud environment or a shared server, you can no longer assume that process isolation is absolute. If you can land a process on the same physical core as a target, you have a viable path to data exfiltration.
This is not just about local privilege escalation. It is about cross-boundary data theft. During an engagement, you should check the CPU model of your target. If you are dealing with Intel processors from the Skylake to the Tiger Lake/Ice Lake generations, you are likely looking at a vulnerable target. You can verify the vulnerability status by checking the system logs for microcode updates or using tools that query the CPU's vulnerability status via the /sys/devices/system/cpu/vulnerabilities/ interface on Linux.
The Cost of Mitigation
Defending against Downfall is not free. Intel has released microcode updates that prevent the Gather instruction from speculatively forwarding data to subsequent instructions. However, this fix comes with a significant performance penalty. For workloads that rely heavily on vector instructions—such as high-performance computing, video encoding, or database operations—the performance hit can reach up to 50 percent.
Blue teams are currently in a difficult position. They must choose between the risk of data leakage and the reality of degraded system performance. As a researcher, your role is to help them quantify that risk. If you are testing a system that handles highly sensitive data, the performance cost of the microcode patch is a necessary trade-off. If you are testing a system where the data is less critical, you might find that the organization has opted to disable the mitigations to maintain throughput.
Understanding the hardware beneath the software is no longer optional for serious security work. Downfall is a reminder that the most sophisticated software security controls are only as strong as the hardware they run on. Keep an eye on the Intel Security Advisory for the latest updates on affected platforms and ensure your testing methodology accounts for these microarchitectural realities.
Vulnerability Classes
Target Technologies
Attack Techniques
All Tags
Up Next From This Conference

Chained to Hit: Discovering New Vectors to Gain Remote and Root Access in SAP Enterprise Software

Zero-Touch-Pwn: Abusing Zoom's Zero Touch Provisioning for Remote Attacks on Desk Phones

ODDFuzz: Hunting Java Deserialization Gadget Chains via Structure-Aware Directed Greybox Fuzzing
Similar Talks

Kill List: Hacking an Assassination Site on the Dark Web

Hacking Apple's USB-C Port Controller

