Updated: 01/24/2018 by Computer Hope
Meltdown and Spectre are security vulnerabilities that affect the majority of modern CPUs. Practical exploits for these vulnerabilities were discovered independently in 2017 by researchers at Graz University of Technology in Austria, and Google’s Project Zero in California. The vulnerabilities were formally announced on January 3, 2018.
Meltdown is a vulnerability specific to Intel CPUs. When Intel CPUs are asked to prefetch data, they read the data before checking the privileges of the user. Although privileged data is not delivered to the unprivileged user, the CPU operates differently based upon the specific data that was fetched. An attacker can monitor the processor’s performance in a “side-channel”, and discern important details about the data. This information improves or guarantees the chance that subsequent attacks will succeed.
The effect is similar to seeing someone moving something behind a curtain. You cannot see the thing, but if you can see its shape and movement in the curtain, you can make an educated guess about what it is. It’s called “Meltdown” because the informational barrier that protects privileged data is effectively dissolved by the attack.
The video below, created by researchers who discovered it, shows a proof-of-concept Meltdown attack in action.
Spectre is similar to Meltdown, but instead of attacking proprietary behavior of a chip, it targets previously-unknown weakness of a fundamental CPU design paradigm.
The paradigm, out-of-order execution, uses speculative execution to “guess” what operation should happen next, and do some of that work ahead of time. If the guess is correct, a major speedup is achieved. CPUs with this design are called superscalar processors. Most modern CPUs are superscalar, such as the ones in modern desktops, laptops, and mobile devices.
Spectre takes advantage of superscalar processors by manipulating their speculative branch predictions (guesses). The attacker issues instructions crafted to cause incorrect guesses by the CPU, which permits side-channel analysis. Spectre then uses this information to manipulate what code the CPU executes next, including the private instructions of another running program. This general type of attack is called branch target injection.
Spectre attacks are difficult to implement, because they must specifically target the victim’s software. They are also more difficult to prevent, because they affect all superscalar processors, including those created by Intel, AMD, and ARM.
The vulnerability is called “Spectre” in reference to speculative processing, and because this problem will “haunt” the computer world for many years to come.
Why are they important?
These vulnerabilities exist in the physical circuitry of the CPU, so they are very difficult to fix.
Meltdown affects every Intel CPU created in the last twenty years. Spectre affects a fundamental part of most modern CPUs, including those made by Intel, AMD, and ARM.
Meltdown attacks can be mitigated by changes to the operating system, which will result in slower performance. However, for Spectre attacks, no software-based mitigation may be possible at all.
Although they are different, both Meltdown and Spectre use a technique called side-channel analysis, which discerns private information being processed without seeing it directly. The attacker cannot see the data, but can measure side-effects when the CPU processes it, such as how much time is taken, or how much power is consumed. By measuring those effects, the attacker can deduce the information, or its location in memory, and launch another attack.
Is my device affected?
Desktop and laptop computers
Meltdown affects all Intel processors dating back to at least 1995. As of this writing, fixes are in development for Microsoft Windows, macOS X, and Linux operating systems. These fixes mitigate the possibility of attack at the kernel level, at an estimated 5-10% performance cost.
Spectre affects all superscalar processors, which includes the vast majority of CPUs manufactured by Intel and AMD, and many created by ARM. Scalar processors are not affected. For instance, the Raspberry Pi uses scalar ARM processors, which do not employ speculative processing and are not vulnerable to this attack.
Android and iOS devices, such as smartphones and tablets, are theoretically susceptible to both attacks. However, the newest versions of Android and iOS include updates to mitigate Meltdown; and Spectre attacks, while possible, have been shown to be highly unfeasible.
Google has announced that Chrome version 64, with an estimated release date of January 23, 2018, will mitigate Meltdown in the browser.
Microsoft Edge users can expect the browser to be patched automatically by Windows Update. Opera has also announced a forthcoming security update to mitigate Meltdown.
How can I protect my device?
To protect your device from the Meltdown attack, install all updates currently available for your operating system.
- For Windows 10, 8, and 7, check for a new Windows Update.
- For macOS X, check for new security updates in the App Store.
- For Android, install the Google December 2017 Security Update on your smartphone or tablet. You can find updates under Settings, About Device. Newer Pixel, Nexus, and Galaxy phones are immediately eligible for the security upgrade. Check with your manufacturer if you’re not sure the update is available for your device.
- For iOS, install iOS 11.2 or higher on your smartphone or tablet. To check for updates, go to Settings, General, Software Update.