Security Software

More information on NetCAT

On September 10, 2019, researchers from VU Amsterdam published a whitepaper titled, “NetCAT, Practical Cache Attacks from the Network.” In scenarios where a malicious actor has a direct network connection to the target system, NetCAT may enable a Prime+Probe style exploit that targets processors supporting Intel® Data-Direct I/O Technology (Intel® DDIO) and Remote Direct Memory Access (RDMA) to disclose system information

This issue has a low CVSS base score of 2.6. In scenarios where Intel DDIO and RDMA are enabled, strong security controls on a secured network are required, as a malicious actor would need to have read/write RDMA access on a target machine using Intel DDIO to use this exploit. In the complex scenarios where Intel DDIO and RDMA are typically used, such as massively parallel computing clusters, malicious actors typically don't have direct access from untrusted networks.

Employing previously published best practices for side channel resistance in software applications and cryptographic implementations, including using constant-time style code, can mitigate the exploits described in this research.

More information can be found in Intel Security Advisory INTEL-SA-00290.

Was this article helpful?YesNo
0% of users found this helpful

Intel technologies’ features and benefits depend on system configuration and may require enabled hardware, software, or service activation. Performance varies depending on system configuration. Check with your system manufacturer or retailer or learn more at

All information provided here is subject to change without notice. Contact your Intel representative to obtain the latest Intel product specifications and roadmaps.

The products and services described may contain defects or errors known as errata which may cause deviations from published specifications. Current characterized errata are available on request.

Intel provides these materials as-is, with no express or implied warranties.

No product can be absolutely secure.

Intel, the Intel logo, Intel Core, Intel Atom, Intel Xeon, Intel Xeon Phi, Intel® C Compiler, Intel Software Guard Extensions, and Intel® Trusted Execution Engine are trademarks of Intel Corporation in the U.S. and/or other countries.

*Other names and brands may be claimed as the property of others.