PDA

View Full Version : Major Intel, Arm chip security flaw puts your PCs, phones at risk



Cebu_4_2
4th January 2018, 06:08 PM
Major Intel, Arm chip security flaw puts your PCs, phones at risk Security researchers say a common processor design used by Intel and mobile chip tech designer Arm may leave the door open to exposing sensitive system data.

by
Shara Tibken (https://www.cnet.com/profiles/sharatibken/)

January 3, 2018 4:30 PM PST



Getty








A newly discovered exploit in most modern processors could make your computer or phone vulnerable to attacks. But chipmakers say they've got fixes ready to go.
Several researchers, including a member of Google's Project Zero (https://googleprojectzero.blogspot.co.uk/2018/01/reading-privileged-memory-with-side.html) team, found that a design technique used in chips from Intel, Arm and others could allow hackers to access data from the memory on your device. The problem impacts processors going back more than two decades and could let hackers access passwords, encryption keys or sensitive information open in applications.
The flaws, known by the names Spectre (https://spectreattack.com/spectre.pdf) and Meltdown (https://meltdownattack.com/meltdown.pdf), aren't unique to one particular chipmaker or device. Instead, they impact everything from phones to PCs and servers.
"It's not really one vendor's problem," Steve Smith, head of Intel's data center engineering operations, said during a conference call Wednesday. "It's not an issue with our product. It's not an issue with someone else's product." It's a general design issue that impacts most modern chips, he said.
See also

Cybersecurity is a mess, mobile chip chief says (https://www.cnet.com/news/cybersecurity-mobile-arm-simon-segars-hacks/)
How to figure out which Intel chip you need (https://www.cnet.com/news/how-to-decode-an-intel-chip-name/)
Security finally got the awareness it needed in 2017. Now what? (https://www.cnet.com/news/security-awareness-finally-in-2017-now-what/)


But you shouldn't panic or worry that hackers will access your 5-year-old laptop or brand new Pixel phone. Intel has been working with Arm, PC chip rival AMD and others to investigate the exploit and come up with a fix.
The New York Times (https://www.nytimes.com/2018/01/03/business/computer-flaws.html?_r=0) reported one flaw, Spectre, could require a processor redesign. But Intel and Arm say both exploits can be patched with software updates from them and operating system makers over the coming days and weeks.
They also plan to design their future chip architecture to prevent the exploits. In the case of Intel's fix, it could slow the performance of some devices by 30 percent or more. Most users, though, won't see much of an impact, likely only as much as 2 percent, Smith said.
Intel and Arm noted that no one's device has actually been hacked through this exploit and that a hacker would need to have malware running locally on the device to access data. Intel also said (https://newsroom.intel.com/news/intel-responds-to-security-research-findings/) it believes the exploits can't corrupt, modify or delete data.
"We quickly realized this applies to most modern microprocessors that are high performance and utilize speculative techniques to gain the performance advantage," Smith said. "That has gotten us to [work on fixes] in a more industry collaborative way."
Chips at riskThe issue likely impacts most Intel computers sold for the past two decades. It's unclear how many mobile devices could potentially be at risk. The vast majority of the world's smartphones and tablets run on chips based on Arm technology. That includes Apple, Samsung, Qualcomm and others.
https://cnet3.cbsistatic.com/img/b2OQ0hI2lJ5Ok2FURjHUNNSLFkI=/fit-in/970x0/2018/01/04/52c192b1-5b28-4d40-9149-ea1b230e99a1/intel-exploit.jpgIntel explains a newly discovered exploit impacting chips.
Intel Arm said certain high-end processors based on its Cortex-A (https://www.arm.com/products/processors/cortex-a) and other technology are at risk, but it noted that "the majority" of its chips are not impacted. Chips based on the Cortex-A architecture go into mobile devices, networking infrastructure, home and consumer devices, automotive in-vehicle infotainment and driver automation systems, and embedded designs. The company's Cortex-M processors, which are used in low-power, connected internet of things devices, aren't impacted.
"We are in the process of informing our silicon partners and encouraging them to implement the software mitigations developed if their chips are impacted," Arm said. It also published a support page (https://developer.arm.com/support/security-update) with more information.
AMD, Intel's chief rival in supplying processors for computers and data centers, said the exploit has little impact on its processors. One possible exploit could be resolved with software and operating system updates with "negligible performance impact," AMD said, while the other two don't affect AMD chips because of differences in its architecture.
"The threat and the response to the three variants differ by microprocessor company, and AMD is not susceptible to all three variants," the company said in a statement. "Due to differences in AMD's architecture, we believe there is a near zero risk to AMD processors at this time."
For more on how the exploit works, see ZDnet (http://www.zdnet.com/article/security-flaws-affect-every-intel-chip-since-1995-arm-processors-vulnerable/)'s report.
Finding a fixGoogle said in its blog post about the exploit that the issue has been mitigated in many products or wasn't a vulnerability in the first place. But in some cases, users may need to take steps (https://support.google.com/faqs/answer/7622138#chrome) to make sure they're using a protected version of a product. In the Chrome browser, for instance, you have to enable something called "Site Isolation (http://www.chromium.org/Home/chromium-security/site-isolation)," which isolates websites into separate address spaces. An upcoming browser update, Chrome 64, will provide protections against the exploits when it's available Jan. 23.
Apple didn't respond to requests for comment.
Along with impacting personal computing devices, the exploit also hurts servers in data centers, like Amazon's cloud service. Amazon Web Services said (https://aws.amazon.com/security/security-bulletins/AWS-2018-013/) "all but a small single-digit percentage of instances across the Amazon EC2 fleet are already protected. The remaining ones will be completed in the next several hours, with associated instance maintenance notifications."
Microsoft said that it has been working closely with chipmakers to release fixes for its customers.
"We are in the process of deploying mitigations to cloud services and are releasing security updates [Wednesday] to protect Windows customers against vulnerabilities affecting supported hardware chips from AMD, Arm and Intel," the company said in a statement. "We have not received any information to indicate that these vulnerabilities had been used to attack our customers."
The flaws initially were discovered in the middle of 2017 but not made public until this week. Technology site The Register (https://www.theregister.co.uk/2018/01/02/intel_cpu_design_flaw/) on Tuesday reported news about the exploit, causing Intel and the security researchers to publish their findings sooner than planned -- before fixes were in place.
CNET's Dan Ackerman contributed to this report.
First published Jan. 3 at 8:50 a.m. PT.
Update, 12:47 p.m. PT: Adds Intel's comments.
Update, 2:15 p.m. PT: Adds comments from ARM and AMD.
Update, 4:30 p.m. PT: Rewrite and updates with additional information throughout.
Update, 5:55 p.m. PT: Updates with Microsoft comment and other background information.
Tech Enabled (https://www.cnet.com/tech-enabled/): CNET chronicles tech's role in providing new kinds of accessibility.
Special Reports (https://www.cnet.com/special-reports/): CNET's in-depth features in one place.

Joshua01
4th January 2018, 06:49 PM
Scary!!!!!

Seriously, there's no such thing as total security once you venture out into the world. This 'news' is more about finally letting the public know the jewish chip makers have had a backdoor to your electronic devices for years. They're our best buddies tho!

PatColo
4th January 2018, 07:18 PM
Operation Talpiot (https://duckduckgo.com/?q=operation+talpiot) ^

crimethink
4th January 2018, 07:30 PM
NOT "flaws." Deliberate backdoors for the NSA, GCHQ, and Mossad. Most (((Intel))) chips are designed in "Israel."

Someone discovered how they work, and now "patches" are being issued. "Patches" that likely only change how surreptitious access occurs.

Joshua01
4th January 2018, 07:30 PM
Jew bastards!
Operation Talpiot (https://duckduckgo.com/?q=operation+talpiot) ^

crimethink
4th January 2018, 10:18 PM
The name of the company, Intel, is dual-meaning, and its primary purpose is "hidden in plain sight" within that name.

The single individual who made Intel what it became was (((András István Gróf))) aka "Andy Grove," Hungarian Jew and Holocaust™ Survivor™. While not truly a founder, he was there from the beginning, "managing" the company with Fairchild Semiconductor refugees Moore and Noyce.

https://www.intel.com/content/www/us/en/jobs/locations/israel/sites.html

https://www.timesofisrael.com/haifa-team-sires-intels-fastest-ever-processor/

https://www.timesofisrael.com/how-intel-came-to-be-israels-best-tech-friend/

https://www.ynetnews.com/articles/0,7340,L-4388453,00.html


The "flaws" were designed in at Intel's "Israel" facilities.

singular_me
5th January 2018, 02:23 AM
flaws will forever exist

1) one cannot know everything
2) by design so ((the hidden hand)) can exploit it when time is right
3) allowing ((them)) to control by just being decades ahead of the mainstream consensus, and of course implement ((their)) solutions, more tyranny

so anybody buying into "security" is being fooled... of course competition blinds so many in the meantime, but thats the purpose of competition, to keep one distracted

The threat from Spectre “is going to live with us for decades,” said Paul Kocher, a senior computer researcher.' http://www.presstv.com/Detail/2018/01/04/547793/Meltdown-Spectre-Intel-Google-Microsoft-computer-Amazon

singular_me
6th January 2018, 02:53 AM
hysterical... ???

well, for decades we heard that Macs were much less prone to viruses... all good for cyber totalitarianism
=================

Apple says almost all its devices are affected by the Spectre and Meltdown bugs
http://www.independent.co.uk/news/apple-bugs-intel-spectre-meltdown-all-devices-affected-latest-a8142836.html

Cebu_4_2
6th January 2018, 11:38 AM
Apparently the patches slow the phones down considerably.

PatColo
6th January 2018, 12:38 PM
Apparently the patches slow the phones down considerably.

heh, apple's "patches" do that on purpose, to any models older than their current latest greatest most overpriced model.

crimethink
6th January 2018, 01:36 PM
Apparently the patches slow the phones down considerably.

I installed the Windows security update for 1/4/18 (KB4056892), and have a noticeable sluggishness on my i7 laptop.

KB4056892 is only for Windows 10 Fall Creators Update...

https://www.cnet.com/how-to/how-to-protect-your-pc-against-the-intel-chip-flaw/