Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Meltdown and Spectre CPU Flaws Expose Modern Systems to Risk

    Written by

    Sean Michael Kerner
    Published January 4, 2018
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      After a rollercoaster day of speculation on Jan. 3 about a severe Intel chip flaw, Google’s Project Zero research team revealed later that same day details about the CPU vulnerabilities.

      The CPU flaws have been branded as Meltdown and Spectre and have widespread impact across different silicon, operating system, browser and cloud vendors. The Meltdown flaw, identified as CVE-2017-5754, affects Intel CPUs. Spectre, known as CVE-2017-5753 and CVE-2017-5715, impacts all modern processors, including ones from Intel, Advanced Micro Devices and ARM.

      “Meltdown breaks the mechanism that keeps applications from accessing arbitrary system memory, consequently, applications can access system memory,” the Meltdown attack advisory states. “Spectre tricks other applications into accessing arbitrary locations in their memory.”

      Nearly every Intel processor shipped since 1995 is at risk from Meltdown. The flaw is in how memory isolation works on Intel CPUs, despite the use of mechanisms such as Address Space Layout Randomization (ASLR), which is widely used in all modern operating systems. Linux kernel developers started working on a patch for the issue in November 2017, dubbing it Kernel Page Table Isolation (KPTI) and the fix KAISER (Kernel Address Isolation to have Side-channels Efficiently Removed).

      Spectre

      While speculation about Meltdown was present before the official disclosure, there were few public indications about the Spectre issues, which are potentially significantly more troublesome. The Spectre flaws abuse a CPU function in modern processors that use something known as “speculative execution” to maximize chip performance.

      “Spectre attacks involve inducing a victim to speculatively perform operations that would not occur during correct program execution and which leak the victim’s confidential information via a side channel to the adversary,” the 16-page research paper on Spectre stated.

      At present, it’s not known if attackers have used either the Meltdown or Spectre vulnerability to exploit users. Perhaps even more worrisome, according to researchers, is that the exploitation of Meltdown or Spectre doesn’t leave any evidence in traditional log files.

      “The name [Spectre] is based on the root cause, speculative execution,” the meltdown attack advisory stated. “As it is not easy to fix, it will haunt us for quite some time.”

      Browsers

      One of the potential attack vectors for Meltdown and Spectre is via web browsers running on vulnerable systems.

      “Our internal experiments confirm that it is possible to use similar techniques from Web content to read private information between different origins,” Luke Wagner, software engineer at Mozilla, wrote in a blog post. “The full extent of this class of attack is still under investigation and we are working with security researchers and other browser vendors to fully understand the threat and fixes.” 

      Google is also working to provide new protections in its Chrome browser to help protect against Meltdown and Spectre. There is an optional feature now in Chrome called “Site Isolation” that can help to protect users.

      “With Site Isolation enabled, the data exposed to speculative side-channel attacks are reduced as Chrome renders content for each open website in a separate process,” a Google Chrome advisory stated.

      What Users Should Do

      While the Meltdown and Spectre issues are dangerous, there are currently patches available to help mitigate the risks of both flaws. 

      Microsoft had originally intended to include patches as part of its regularly scheduled Patch Tuesday update on Jan. 9, but it released out-of-band patches on Jan. 3, which are now available to users via the regular Windows Update mechanism. The update is currently only automatically available for Windows 10 users, with Windows 7 and 8 getting the automated update on Jan. 9. 

      Major cloud providers including Microsoft Azure, Amazon Web Services and Google Cloud have already updated their platforms with patches to help mitigate Meltdown and Spectre risks.

      The upstream Linux kernel has already patched for the issues as well, and multiple Linux distributions including Red Hat, SUSE and Ubuntu have provided updates to their users. Although Linux does have mitigations in place, Linux creator Linus Torvalds is among those who aren’t entirely convinced that software will fix all the issues.

      “I think somebody inside of Intel needs to really take a long hard look at their CPUs, and actually admit that they have issues instead of writing PR blurbs that say that everything works as designed,” Torvalds wrote in a mailing list message.

      Torvalds isn’t the only one who believes something more than software patches is needed to fully resolve Meltdown and Spectre. CERT also sees the root cause as being hardware-related, with software only providing mitigations.

      “The underlying vulnerability is primarily caused by CPU implementation optimization choices,” CERT warned in an advisory. “Fully removing the vulnerability requires replacing vulnerable CPU hardware.”

      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      Sean Michael Kerner
      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and writer for several leading IT business web sites.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×