Intel will have patches issued by next week to protect more than 90% of its processors introduced in the last five years, in the wake of disclosure of serious security vulnerabilities affecting nearly every computer user in the world.
In a statement Thursday, Intel Corp. (Nasdaq: INTC) says it is rapidly rolling out updates for personal computers and servers based on its processors "that render those systems immune" to the Spectre and Meltdown security vulnerabilities reported this week. Those vulnerabilities can allow attackers to gain access to a computer's memory, reaping passwords and other confidential information. The vulnerabilities affect virtually every Intel-based system in the world. (See New Intel Vulnerability Hits Almost Everyone.)
More specifically, Meltdown affects virtually every Intel processor made since 1995, and Spectre affects Intel, AMD and ARM processors, according to a statement from researchers.
"Intel has already issued updates for the majority of processor products introduced within the past five years," Intel says. "By the end of next week, Intel expects to have issued updates for more than 90 percent of processor products introduced within the past five years. In addition, many operating system vendors, public cloud service providers, device manufacturers and others have indicated that they have already updated their products and services." (See Intel Chip Vulnerability Sends Cloud Providers Into Patching Overdrive.)
But can Spectre be so easily beaten? The research paper describing the vulnerability suggest a permanent fix is a major undertaking: "While makeshift processor-specific countermeasures are possible in some cases, sound solutions will require fixes to processor designs as well as updates to instruction set architectures (ISAs) to give hardware architects and software developers a common understanding as to what computation state CPU implementations are (and are not) permitted to leak."
However, Intel stands by its fix. "With regard to Intel’s products, all the issues disclosed by researchers can be mitigated either by software or firmware updates. That includes both Meltdown and Spectre," a company spokesperson said in an email statement.
Keep up with the latest enterprise cloud news and insights. Sign up for the weekly Enterprise Cloud News newsletter.
Intel also pushed back on claims that the patches would slow system performance by 20% to 30%. "Intel continues to believe that the performance impact of these updates is highly workload-dependent and, for the average computer user, should not be significant and will be mitigated over time. While on some discrete workloads the performance impact from the software updates may initially be higher, additional post-deployment identification, testing and improvement of the software updates should mitigate that impact," the company said.
We've asked infrastructure suppliers on how their products and customers are impacted, and mostly they still seem to be figuring it out. VMware Inc. (NYSE: VMW) has patches available for its vSphere ESXi, Workstation Pro and Fusion Pro products.
Microsoft Corp. (Nasdaq: MSFT) has patches available for Windows desktops and servers, as well as SQL Server, and says it has "already deployed mitigations across the majority of our cloud services and is accelerating efforts to complete the remainder."
Cisco Systems Inc. (Nasdaq: CSCO) issued a statement Thursday afternoon, saying most of its products are not vulnerable. "Although the underlying CPU and OS combination in a product may be affected by these vulnerabilities, the majority of Cisco products are closed systems that do not allow customers to run custom code on the device, and thus are not vulnerable," the company said. Only Cisco devices that allow customers to "execute their customized code side-by-side with the Cisco code on the same microprocessor are considered vulnerable," said Cisco.
Also, Cisco products that can be deployed as virtual machines or containers could be targeted by attacks "if the hosting environment is vulnerable. Cisco recommends customers to harden their virtual environment and to ensure that all security updates are installed," the company said, adding that it plans to release software updates to address the vulnerability.
— Mitch Wagner Editor, Enterprise Cloud News