sb-au logo
Story image

Intel processor vulnerabilities: What you need to know about Meltdown and Spectre

08 Jan 2018

Microsoft, Linux, Google, and Apple have started rolling out patches addressing design flaws in processor chips that security researchers have named Meltdown and Spectre.

Here’s what you need to know about these flaws:

What are Meltdown and Spectre?

Meltdown, designated as CVE-2017-5754, can enable hackers to gain privileged access to parts of a computer’s memory used by an application/program and the operating system (OS).

Meltdown affects Intel processors.

Spectre, designated as CVE-2017-5753 and CVE-2017-5715, can allow attackers to steal information leaked in the kernel/cached files or data stored in the memory of running programs, such as credentials (passwords, login keys, etc.).

Spectre reportedly affects processors from Intel, Advanced Micro Devices (AMD), and Advanced RISC Machine (ARM).

Modern processors are designed to perform “speculative execution.”

This means it can “speculate” the functions that are expected to run, and by queuing these speculations in advance, they can process data more efficiently and execute applications/software faster.

It’s an industry technique used to optimise processor performance.

However, this technique permits access to normally isolated data, possibly allowing an attacker to send an exploit that can access the data.

What’s the impact?

Intel processors built since 1995 are reportedly affected by Meltdown, while Spectre affects devices running on Intel, AMD, and ARM processors.

Meltdown is related to the way privileges can be escalated, while Spectre entails access to sensitive data that may be stored on the application’s memory space.

The potential impact is far-reaching: Desktops, laptops, and smartphones running on vulnerable processors can be exposed to unauthorized access and information theft.

Cloud-computing, virtual environments, multiuser servers—also used in data centers and enterprise environments—running these processors are also impacted.

It’s also worth noting that the patches that have been released for Windows and Linux OSs can reportedly reduce system performance by five to 30%, depending on the workload.

Google’s Project Zero has proof-of-concept (PoCs) exploits that work against certain software.

Intel and Google reported they have not yet seen attacks actively exploiting these vulnerabilities so far.

Are they fixed?

Microsoft issued a security bulletin and advisory ahead of their monthly patch cycle to address these vulnerabilities in Windows 10.

Updates/fixes for Windows 7 and 8 will be deployed on the January Patch Tuesday on January 9.

Microsoft also issued recommendations and best practices for clients and servers.

Google has published mitigations on the infrastructure/products that may be affected (YouTube, Google Ads, Chrome, etc.).

They also released a Security Patch Level (SPL) for Android covering updates that can further limit attacks that may exploit Meltdown and Spectre.

A separate security update for Android will also be released on January 5.

Note that patching on Android is fragmented, so users need to notify their OEMs for their availability.

Nexus and Pixel devices can automatically download the update.

Apple’s macOS has been reportedly patched in version 10.13.2, while 64-bit ARM kernels were also updated.

VMWare also issued its own advisory.

Mozilla, whose team confirmed that browser-based attacks may be possible, addressed the vulnerabilities with Firefox 57.

Story image
Global attack volume down, but fraud and cyber threats still going strong
“The move to digital, for both businesses and consumers, has been significant. Yet with this change comes opportunity for exploitation. Fraudsters look for easy targets: whether government support packages, new lines of credit or media companies with fewer barriers to entry."More
Link image
Why performance monitoring is essential to keep cloud costs down
Cloud comes with many different associated costs, which can sneak up on organisations and drive down efficiency. Here's how to reduce costs by up to 50%.More
Story image
Video: 10 Minute IT Jams - The benefits of converged cloud security
Today, Techday speaks to Forcepoint senior sales engineer and solutions architect Matthew Bant, who discusses the benefits of a converged cloud security model, and the pandemic's role in complicating the security stack in organisations around the world.More
Story image
Phishing scam imitates SharePoint & OneNote for nefarious clicks
Sophos researchers say that the attackers take a slightly different approach to the standard ‘fake login’ phishing email.More
Story image
Report: 151% increase in DDoS attacks compared to 2019
It comes as the security risk profile for organisations around the world increased in large part thanks to the COVID-19 pandemic, forcing greater reliance on cloud technology and thrusting digital laggards into quick and unsecured migrations.More
Story image
Shlayer malware proves Apple devices aren't as secure as you think
"Apple never talks about malware publicly, and loves to give the impression that its systems are secure. Unfortunately, the opposite has been proven to be the case with great regularity."More