Quelle est la gravité de Spectre/Meltdown ?
A lot of fuss has been made over the past few weeks about two major bugs found in Intel and AMD CPUs: Spectre and Meltdown. But what are these malicious flaws in the the big chip giantsâ hardware and are they really all that bad? Whatâs the worst they could do?
What are the bugs, really?
Meltdown is an exploit that affects Intelâs chip architectures â think almost any CPU Intel has ever produced, from the early â70s onwards â IBM Power processors and many ARM based chips too. It effectively breaks the isolation between user applications and the operating system, allowing a rogue application or attacker to access the system memory and to read it unencrypted. That effectively gives them access to any information accessed by your system, be it an application or the operating system itself.
Spectre is a similar bug with even wider-reaching capabilities. It can effect just about every computer system in the world, from desktops, to laptops to mobile devices â anything running AMD, Intel, ARM or IBM processors can be attacked using this method. It works by breaking the isolation between different applications, exploiting whatâs known as âbranch prediction,â to hijack a systemâs best practices to steal information from applications as they transfer it from one to the other.
Although Spectre is harder to utilize for attackers than Meltdown, itâs also harder to stop. The fact that itâs so wide reaching makes it doubly difficult to deal with.
Is it really that bad though?
In short, yes. The reason Spectre and Meltdown have made such a big splash among security and IT professionals and even leaked into the mainstream press, is that they are so wide reaching, but also such low-level attacks. Where most malware or exploits requires access to specific applications, specific operating systems or software and hardware platforms, Spectre and Meltdown affect just about everyone. More than that though, they give full system access without the ability for traditional security measures like anti-virus or anti-malware scans to protect the system.
Although we donât actually know whether Meltdown/Spectre have been exploited in the wild, the fact that they are widely known about now means that if they havenât already, they soon will be, which is why itâs so paramount that people fix up their systems against the potential attack.
Itâs not something you need to panic over â donât drop everything to fix up these problems right now, but it is something you need to be concerned with and make sure that in the very near future, if you havenât already, you take the necessary steps to protect your devices against the potential attack vectors.
How to patch out the flaws
The first step is to update all of your devices. If youâre running an Android device, chances are youâve already downloaded the Google patch that will prevent your device from being exploited by either of these bugs. You may need to get an update direct from your device manufacturer itself, so double check to see if and when they have released it. If not, keep your eyes peeled for when it does and then download and install it straight away.
The same goes for iOS devices. Download the system patches and firmware upgrades as soon as they become available.
If youâre running a Windows PC, make sure to download the latest Windows patches. Windows Update has probably already done it for you, but make doubly sure by doing a manual update. It would also be worth checking to see if your motherboard manufacturer has released any BIOS or chipset driver patches to fix up the issue at a lower level.
If youâre running MacOS, make sure to do the same. Chromebooks should already be updated to protect against this issue, but double check youâre running at least version 63.
The hardware option
The best way to protect against this problem will be with new hardware. Intel has pledged that its next-generation and after â beyond the 8th â will not have the hardware flaw that makes Spectre and Meltdown possible. Other manufacturers should do the same.
Although you donât need to buy new hardware to make sure, if youâre concerned, a new system later this year would be the way to go.
In the mean time, if you want to see if your system is vulnerable, the InSpectre application can give you a good idea of how protected you are.
