Critical Security Vulnerability – Meltdown & Spectre

meltdown-spectre

 

Critical Security Vulnerability

 

On January 3, 2018, the National Cybersecurity and Communications Integration Center (NCCIC) became aware of a set of security vulnerabilities-known as Meltdown and Spectre-that affect modern computer processors. Exploitation of these vulnerabilities could allow an attacker to obtain access to sensitive information.

Meltdown & Spectre are flaws affecting all laptops, desktops, mobile devices and servers with Intel processor chips ever made since 1995. It allows an attacker to compromise the privileged memory of a processor. It also allows an attacker to use JavaScript code running in an internet browser to access memory in the attacker’s processor. That memory content could contain keystrokes, passwords and other valuable information. It has been noted that it is probably one of the worst CPU bugs ever found.

Lines of defense such as firewall or antivirus/antimalware can stop this attack until after the threats have become known. It is unknown if the Meltdown or Spectre vulnerabilities have been exploited.

 

How to protect yourself:
• The three major operating systems, Microsoft, Apple and Linux are all issuing updates that should serve as a fix for the vulnerability.
• Browsers such as Firefox, Chrome and IE have also released patches. Most of them have been released on January 4th and others are expected to be released today.
• Apply Computer & Server Manufacturer firmware updates. Most are in progress of being developed.

 

Potential issues with these patches
1. Antivirus software may prevent the patches from being installed because of what the patches are updating. Over the next few days, antivirus software will be pushing out exceptions to allow the patches to be installed.
2. After patching, performance may diminish by up to 30% on all devices depending on the applications.
3. Cloud Service Providers such as Amazon Web Services, Azure and Google have reported downtime on servers.
4. It may cause blue screen errors on Windows 10 & Windows 7
5. If you have Windows Server 2008 R1 & Windows Server 2012 R1, the patch is not available and there is no ETA of when it will be available. It is highly recommended to upgrade your servers.

 

What to do?
• Make sure that mobile devices such as iPhone and Android devices are up-to-date.
• For clients who have Managed IT or Proactive Care services, CBM Technology is rushing to patch up your servers and computers.
• For clients who have Managed AV, we will be reviewing for all computers and servers that have missing patches and contacting you create an update plan.
• For all others, please contact CBM Technology ASAP for assistance in updating your devices.

 

For additional information:

https://meltdownattack.com
https://www.us-cert.gov/ncas/alerts/TA18-004A

Leave a Reply

You must be logged in to post a comment.