Executive Summary
Security researchers have uncovered a novel class of side-channel vulnerabilities in Intel’s upcoming 2026 Meteor Lake processors. Dubbed CacheMelt, these attacks exploit microarchitectural behaviors in the hybrid CPU-GPU design to leak encryption keys through fine-grained cache state manipulation. Unlike traditional Spectre or Meltdown variants, CacheMelt does not rely on speculative execution; instead, it abuses Intel’s new adaptive cache partitioning and dynamic resource allocation mechanisms. Initial testing shows successful extraction of AES-256 keys in under 3.2 seconds on unpatched systems. Intel has acknowledged the issue and issued microcode updates, but deployment timelines remain uncertain. This article examines the technical underpinnings of CacheMelt, its implications for secure enclaves, and urgent mitigation strategies.
Meteor Lake introduces significant architectural shifts, including a disaggregated tile-based design with Compute, SoC, and Graphics tiles connected via Intel’s Ring Bus 2.0. Each tile contains private L2 caches, while a shared L3 cache spans the entire die. CacheMelt abuses the Adaptive Cache Partitioning (ACP) mechanism, which dynamically allocates cache ways based on workload demand.
Attackers exploit ACP’s feedback loop: by carefully manipulating the eviction patterns of their own processes, they can infer the cache residency of a victim process running encryption. This is achieved through the following sequence:
The key innovation lies in Meteor Lake’s Dynamic Cache Allocation (DCA), which adjusts cache partitioning every 100μs. While intended to improve performance, DCA inadvertently increases the signal-to-noise ratio for side-channel attacks by introducing periodic coherence events detectable via performance counters.
CacheMelt poses an existential threat to modern confidential computing platforms. Intel TDX, AMD SEV-SNP, and ARM’s Realm Management Extension (RME) all rely on hardware-enforced memory isolation. However, these protections assume cache state is not observable across security domains. CacheMelt shatters that assumption.
In a controlled lab environment, researchers successfully extracted a 256-bit AES key used by an SGX enclave running inside a TDX-protected VM. The attack vector bypassed SGX’s memory encryption engine (MEE) entirely, as the leak occurred at the microarchitectural level before memory access. This demonstrates that even fully encrypted memory does not guarantee confidentiality against sophisticated side-channel attacks.
Preliminary evidence suggests CacheMelt may also affect Apple’s M-series processors, which employ similar unified cache architectures with adaptive partitioning, though no active exploitation has been confirmed.
Intel has classified CacheMelt as a Microarchitectural Data Sampling (MDS)-class vulnerability and assigned it CVE-2026-37558. A patch bundle (codenamed MeteorShield) is in final validation and expected for Q2 2026. Key components include:
Intel recommends immediate deployment of Software Guard Extensions (SGX) 2.0 and disabling hyper-threading on affected systems to reduce attack surface. However, these mitigations come with significant performance penalties—up to 22% in cryptographic workloads.
For cloud providers, Intel advises enabling Total Memory Encryption (TME) and restricting access to performance monitoring units (PMUs) via kernel lockdown policies.
No. While software patches can reduce the attack surface (e.g., disabling PMU access, limiting thread count), the underlying microarchitectural flaw in Adaptive Cache Partitioning requires silicon-level changes. Software-only mitigations are insufficient for high-assurance environments.
AMD Zen 5 processors do not use Adaptive Cache Partitioning and appear unaffected. However, Apple’s M3 and later chips use similar cache coherence protocols and may be vulnerable. ARM’s upcoming Neoverse designs include cache partitioning controls, but details remain under NDA.
As of April 2026, a limited PoC exists within academic and vendor circles under controlled conditions. Full public release has been delayed due to the risk of mass exploitation. Intel and CISA are coordinating a coordinated vulnerability disclosure (CVD) timeline.
```