It turned out that everything was just the beginning … Intel responded to a story about memory security, saying it was an industry-wide issue and not just Intel-specific, but the company did not specify a solution to the problem.
Intel yesterday issued a statement on Wednesday afternoon (US time) after the Intel X86 architecture failed to properly protect kernel memory. Intel said in a statement, AMD and ARM processors have the same error – although AMD has denied this. The full text is as follows:
Intel and other technology companies are already aware of new security research that describes software analysis methods that, when used for malicious purposes, may incorrectly collect sensitive data from computing devices running the design. Intel believes these exploits will not destroy, modify or delete data.
It has recently been reported that these vulnerabilities are caused by “bugs” or “bugs,” and are unique to Intel products. Based on the analysis so far, many types of computing devices (processors and operating systems with many different vendors) are vulnerable to these attacks.
Intel is committed to product and customer security and is working closely with many other technology companies, including AMD, ARM Holdings and multiple operating system vendors to develop industry-wide ways to address this issue in a timely and constructive manner. Intel has begun to provide software and firmware updates to mitigate these vulnerabilities. Contrary to some reports, any performance impact depends on the workload, which should not be significant to average computer users and will be alleviated over time.
Intel is committed to taking industry best practices and disclosing potential security issues, which is why Intel and other vendors plan to disclose this issue when it announces more software and firmware updates next week. However, due to the current media coverage is not accurate, Intel made this statement today.
Please contact your operating system vendor or system manufacturer and apply all available updates as soon as possible. Following good security measures to prevent malware will usually also help prevent potential exploitation until an update can be applied.
Intel believes its products are the safest in the world and with the support of its partners, the current solutions provide the best security for our customers.
Although Intel explicitly denied that it was a mistake in its statement, Apple, Microsoft and others are already tackling the issue. Since December, Apple has at least partially corrected the issue of macOS High Sierra 10.13.2, and Microsoft has also made a patch for Windows 10.
More bug details have been reported on Tuesday night. CPUs produced since 1997 Almost all X86 devices have two vulnerabilities named “Meltdown” and “Specter”. And contrary to Intel’s assertion, a researcher told ZDNet that an attacker could steal any data on the system without knowing whether the researcher is talking about drives or RAM.
Numerous oversight bodies do not see any evidence of any loopholes now or in the past. However, on Wednesday, some media demonstrated proof of concept code.
ARM has confirmed that the Cortex-A family was affected, but the Cortex-M chip in the “IoT” device did not.
AMD said in a statement: “The CPU makers have different threats and responses to these three versions, and AMD is not vulnerable to any of these three versions.” Due to differences in AMD architecture, we believe AMD processors are currently Almost no risk. “