The vulnerability allows an attacker with physical access to the CPU to bypass the security measures protecting some of its most sensitive data.