ALERT: Your Businessā Infrastructure May Be Susceptible to Meltdown/Spectre Vulnerability
Youād think that Intel would make sure their firmware is of sound integrity, but unfortunately, a recently discovered vulnerability has revealed that itās not as secure as previously thought. The issue involving Intelās chips could potentially lead to a permanent nosedive for your CPUās capacity to perform as intended, which could have disastrous implications for your business.
An unknown blogger calling themselves Python Sweetness describes the issue as āan embargoed security bug impacting apparently all contemporary CPU architectures that implement virtual memory, requiring hardware changes to fully resolve.ā
The bug found complicated the way that various programs interacted with the CPU. Ordinarily, your CPU will have two modes. Kernel offers a complete ācarte blancheā access to the computer or user. This is supposed to be considered the safe mode for your CPU, but Python Sweetness has found that this bug lets programs run through user mode access kernel mode. What this ultimately allows for is the potential for malicious programs to access a userās hardware–a scary thought indeed.
A fix has been developed that mitigates the issue to a small dip in system performance (approximately 2 percent), which is a much smaller price to pay compared to allowing hackers to influence your hardware itself. Originally, it was thought that the processes would be placed on the kernel mode, then shift back to the user mode as needed, but this process slowed down the system. A new Windows update has resolved the CPU problems, even though most professionals thought that a hardware change was the only way to solve it.
If you have a PC with Windows 10 and an antivirus that supports the patch, you should already have the fix implemented. You should make sure to confirm this by navigating to Settings > Update & Security. Once youāve done so, make sure you also review your update history and find Security Update for Windows (KB4056892), or check with your antivirus provider to find out when it will be supported, the patch will not install until it sees that the antivirus has been updated to a version that the vendor verifies supports this patch.
Android device users should have had this issue mitigated by an update pushed on January 5, with other updates incoming to strengthen these protections. Phones that fall under the Google brand, including the Nexus and Pixel phones, should have received patches already, with other Android devices soon to be patched as well. You should check your phone to see, and if you havenāt received one, put pressure on your carrier on a visible forum.
Google Chrome should be updated on January 23, and the other browsers should soon follow, with additional mitigations. Until then, you should ask IT to activate Site Isolation to keep potentially malicious sites from harvesting your data from your other browser tabs.
Other devices (like NAS devices, smart appliances, networking equipment, media equipment, etc.) may also be at risk, as they are using cursory hardware. Itās really important for business owners to have their entire infrastructure reviewed and audited.
These types of problems are one of the best reasons to have a managed service provider as part of your IT management and maintenance infrastructure. Catalyst Technology Group keeps a close eye on the latest in network security, including any new threats to your businessās data or patches that need to be implemented. Weāll do whatever it takes to keep your businessās technology as secure and up to date as possible.
Your business wonāt have to worry about any aspect of IT maintenance, and we can even help your internal team with implementation projects or technology support aspects of running your organization. To learn more, reach out to us at (317) 705-0333.