Meltdown & Spectre: The security flaw that affects us all
Project Zero have uncovered major vulnerabilities in processors going back as far as 1995 - how can you protect yourself from the recently discovered security threat?
This week, Google's in-house security team known as Project Zero announced details of multiple major security flaws affecting processors dating back as far as 1995 from Intel, AMD and ARM CPUs, regardless of the operating system – so there won’t be anyone unaffected here.
These flaws have been named as Meltdown: https://meltdownattack.com/ and Spectre:https://spectreattack.com/
These vulnerabilities could potentially allow an attacker to read arbitrary memory locations on a server, workstation or any device, thus leaking highly sensitive information such as passwords, private data or customer data. This affects both physical and virtual servers, workstations and devices.
Companies including Microsoft, Amazon, Apple and Google are in the process of issuing patches* which should be available in the next few days, with some beta versions already available for testing. Patches are now available for some Windows and Linux builds. For Linux these are now making their way into downstream distributions.
*Patches are normally small (but sometimes large) updates to the software or data that are meant to improve the solution, often through performance or security improvements, but also could be bug fixes to resolve a problem.
Whilst it may sound crazy, this also affects tablets and mobiles. You’ll see press coverage aimed at Intel and Apple as that will generate clicks for the articles, but it will literally affect everyone.
As the vulnerability is due to a physical hardware design flaw, patches to fix these vulnerabilities require extensive changes to the operating system kernels. These fixes unfortunately have a significant performance impact.
It has been reported that systems can expect a 5-30% performance drop depending on the nature of the workload. There are some reports of up to 60% in certain test cases. This may impact website performance, causing longer page load times. Monitoring reports will be reviewed to indicate what impact has been identified, and your Digital Planner and Support team will work with you to identify where this can be recovered.
The vulnerabilities have the following CVE codes:
Additional information can also be found here: