yitit
Home
/
Hardware
/
Intel 10th Gen CPUs & Above Affected By “Reptar” Vulnerability, 12th & 13th Gen CPUs Receive Microcode Mitigations
Intel 10th Gen CPUs & Above Affected By “Reptar” Vulnerability, 12th & 13th Gen CPUs Receive Microcode Mitigations-February 2024
Feb 12, 2026 10:37 PM

Intel's 10th Gen CPUs and above are affected by the new "Reptar" Vulnerability" but the company has quickly rolled out a mitigation for its latest chips.

Intel's Reptar CPU Vulnerability Seen As A Big Threat To The Cloud Computing, Putting Consumers' Data At Stake - 10th Gen & Above Affected

The Reptar vulnerability, which is labeled as CVE-2023-23583is perceived as a "severe risk" mainly since it has the ability to "allow escalation of privilege and/or information disclosure and/or denial of service via local access". With a CVSS score of 8.8, Reptar has the ability to manipulate ongoing software instructions, which can pose detrimental impacts with one of them being a "'Redundant Prefix Issue". In simple terms, it is when an execution of a particular instruction is interfered with a "REX prefix" which can result in unpredictable system behavior resulting in a system crash/hang.

However, the important fact to note is that this vulnerability was discovered by Google's team of security researchers months ago. According to Tavis Ormandy, the "Reptar" can cause the CPU to malfunction, and can lead to "unexpected behavior" in terms of operations. The vulnerability had a huge impact on virtual machines, which had set the security of cloud hosts and equipment at risk, and potentially put the data of thousands of individuals at stake.

We observed some very strange behavior while testing. For example, branches to unexpected locations, unconditional branches being ignored and the processor no longer accurately recording the instruction pointer in xsave or call instructions.

Oddly, when trying to understand what was happening we would see a debugger reporting impossible states!

This already seemed like it could be indicative of a serious problem, but within a few days of experimenting we found that when multiple cores were triggering the same bug, the processor would begin to report machine check exceptions and halt.

We verified this worked even inside an unprivileged guest VM, so this already has serious security implications for cloud providers. Naturally, we reported this to Intel as soon as we confirmed this was a security issue.

-Google Security Researcher Tavis Ormandy

In terms of the response from Intel, while it was prolonged, it fortunately came by. Since the vulnerability has affected CPUs 10th generation and newer, for now, Team Blue has pushed out mitigation for Intel 12th generation, 13th generation, and 4th generation Intel Xeon processors. There haven't been any reported incidents of an active attack through "Reptar" which is why Intel may have chosen to cater to the relatively newer generations early.

To apply the mitigation in case you are worried about being potentially impacted by Reptar, you can view the list of impacted CPUs here. While this isn't certain yet, the application of the mitigation might result in performance degradation, hence you should keep this in mind before proceeding.

Products with new microcode update:

Product Collection Vertical Segment CPU ID Platform ID
10th Generation Intel® Core™ Processor Family Mobile 706E5 80
3rd Generation Intel® Xeon® Processor Scalable Family Server 606A6 87
Intel® Xeon® D Processor Server 606C1 10
11th Generation Intel® Core Processor Family Desktop

Embedded

A0671 02
11th Generation Intel® Core Processor Family Mobile

Embedded

806C1

806C2

806D1

80

C2

C2

Intel® Server Processor Server

Embedded

A0671 02

The following products have already been mitigated:

Product Collection Vertical Segment CPU ID Platform ID Mitigated Microcode Version
12th Generation Intel® Core™ Processor Family Mobile 906A4 80 0x2b
4th Generation Intel® Xeon® Processor Scalable Family Server 806F8 87 0x2B000461
13th Generation Intel® Core™ Processor Family Desktop B0671 01 0x410E

Comments
Welcome to yitit comments! Please keep conversations courteous and on-topic. To fosterproductive and respectful conversations, you may see comments from our Community Managers.
Sign up to post
Sort by
Login to display more comments
Hardware
Recent News
Copyright 2023-2026 - www.yitit.com All Rights Reserved