Rain: Transiently Leaking Data from Public Clouds Using Old Vulnerabilities

  • Mathé Hertogh
  • , Dave Quakkelaar
  • , Thijs Raymakers
  • , Mahesh Hari Sarma
  • , Marius Muench
  • , Herbert Bos
  • , Erik van der Kouwe

Research output: Chapter in Book/Report/Conference proceedingConference contribution

59 Downloads (Pure)

Abstract

Given their vital importance for governments and enterprises around the world, we need to trust public clouds to provide strong security guarantees even in the face of advanced attacks and hardware vulnerabilities. While transient execution vulnerabilities, such as Spectre, have been in the spotlight since 2018, until now there have been no reports of realistic attacks on real-world clouds, leading to an assumption that such attacks are not practical in noisy real-world settings and without knowledge about the (host or guest) victim. In particular, given that today's clouds have large fleets of older CPUs that lack comprehensive, in-silicon fixes to a variety of transient execution vulnerabilities, the question arises whether sufficient software-based defenses have been deployed to stop realistic attacks---especially those using older, supposedly mitigated vulnerabilities. In this paper, we answer this question in the negative. We show that the practice of mitigating vulnerabilities in isolation, without removing the root cause, leaves systems vulnerable. By combining such mitigated'' (and by themselves harmless) vulnerabilities, attackers may still craft an end-to-end attack that is more than the sum of its parts. In particular, we show that attackers can use L1TF, one of the oldest known transient execution vulnerabilities (discovered in January 2018), in combination with a simple speculative out-of-bounds load, to leak data from other guests in a commercial cloud computing platform. Moreover, with an average end-to-end duration of 15 hours to leak the TLS key of an Nginx server in a victim VM under noisy conditions, without detailed knowledge of either host or guest, the attack is realistic even in one of today's biggest and most important commercial clouds.
Original languageEnglish
Title of host publication2026 IEEE Symposium on Security and Privacy (SP)
PublisherIEEE
Pages1189-1205
Number of pages17
ISBN (Print)9798331560652
DOIs
Publication statusAccepted/In press - 12 Oct 2025
Event
47th IEEE Symposium on Security and Privacy
- Hilton San Francisco Union Square, San Fracisco, United States
Duration: 18 May 202621 May 2026
Conference number: 47
https://sp2026.ieee-security.org/

Publication series

Name IEEE Symposium on Security and Privacy
PublisherIEEE
ISSN (Print)1063-9578
ISSN (Electronic)2375-1207

Conference

Conference
47th IEEE Symposium on Security and Privacy
Country/TerritoryUnited States
CitySan Fracisco
Period18/05/2621/05/26
Internet address

Bibliographical note

Not yet published as of 04/02/2026. Publication expected 12/05/2026.

Fingerprint

Dive into the research topics of 'Rain: Transiently Leaking Data from Public Clouds Using Old Vulnerabilities'. Together they form a unique fingerprint.

Cite this