Spectre and Meltdown
In recent weeks, a significant security risk was exposed. This exploit has been named in two fashions: Spectre and Meltdown. We at SSG feel it important to help disclose the severity and impact of these exploits with this formal release.
Unauthorized Memory Disclosure through CPU Side-Channel Attacks
(“Meltdown” and “Spectre”)
Vulnerabilities exist in multiple modern CPU architectures that could permit an attacker to read the contents of memory.
VMWare, SQL Server, Linux, Windows, everything that uses a processor created in the past 15 years.
Full details of the “Meltdown” and “Spectre” vulnerabilities can be found at the following URLs:
- Intel – https://newsroom.intel.com/news/intel-responds-to-security-research-findings/
- AMD – https://www.amd.com/en/corporate/speculative-execution
- ARM – https://developer.arm.com/support/security-update
Due to the gravity of these exploits, we at SSG recommend patching Hosts, Operating Systems and SQL Server with the appropriate patch(es) being released . Some hosted Cloud solutions have already been patched by AWS and Microsoft Azure – but not all as of yet.
SSG is prepared to assist in patching your systems to ensure the proper security and integrity of your data and business. Contact us so we can help you mitigate these exploits as soon as possible.
Email (firstname.lastname@example.org) us now to schedule one of our consultants to help you secure your servers.