Jump to content

The Complete List Of CPUs Affected By Meltdown + Spectre


humble3d

Recommended Posts

The Complete List Of CPUs Affected By Meltdown + Spectre


The speculative execution CPU bug that literally kneecapped Intel, also affects many AMD and ARM processors.


This means BILLIONS of CPUs around the world, including those powering smartphones, are affected by Meltdown and/or Spectre.


The Meltdown and Spectre CPU flaws that the Google Project Zero team discovered are arguably the worst we have ever known. These vulnerabilities were built into BILLIONS of CPUs that we have been using for the last decade or so.


Not just Intel CPUs, but also CPUs made by AMD, Apple and ARM. Even those that power our smartphones and other smart devices!


Let’s take a look at what we know so far about Meltdown and Spectre, how they affect you, and what we can do about them.


This story is still developing. We will update the article as and when new details emerge. Be sure to check back and refresh the page for the latest information!


Everything On The Meltdown + Spectre CPU Flaws!

 

The Meltdown + Spectre Vulnerabilities


    The Project Zero team identified these vulnerabilities in 2017, reporting it to Intel, AMD and ARM on 1 June 2017.


    These vulnerabilities take advantage of the Speculative Execution and Branch Prediction features of the modern processor, that have been used for many years to improve performance.


    Speculative Execution lets the CPU predict and pre-execute the next instruction, allowing it to “instantly” deliver the results if it’s correct.
    Branch Prediction helps the CPU predict future execution paths that should be speculatively-executed for better performance.


    There are THREE (3) variants of the speculative execution CPU bug :
        Variant 1 : Bounds Check Bypass (CVE-2017-5753)
        Variant 2 : Branch Target Injection (CVE-2017-5715)
        Variant 3 : Rogue Data Cache Load (CVE-2017-5754)
    The Spectre attack (whitepaper) exploits variants 1 and 2.
    The Meltdown attack (whitepaper) exploits variant 3.


    There is a Variant 3a, which appears to affect only certain ARM processors.


What’s The Difference Between Meltdown & Spectre?


    Spectre tricks the CPU branch predictor into mis-predicting the wrong path, thereby speculatively executing code that would not otherwise be executed.


    Meltdown takes advantage of the out-of-order execution capability of modern processors, tricking them into executing malicious code that would normally not be allowed.


    The Spectre name is based on both the root cause – speculative execution, and the fact that it is not easy to fix, and will haunt us for a long time like a spectre (ghost).


    The Meltdown name was chosen because the vulnerability “basically melts security boundaries which are normally enforced by the hardware“.


How Bad Are Meltdown & Spectre?


    The Spectre exploits let an attacker access and copy information from the memory space used by other applications.


    The Meltdown exploit lets an attacker copy the entire physical memory of the computer.


    Unless patched, the affected processors are vulnerable to malware and cyberattacks that exploits this CPU bug to steal critical information from running apps (like login and credit card information, emails, photos, documents, etc.)


    While the Meltdown exploit can be “fixed”, it is likely that the Spectre exploit cannot be fixed, only mitigated, without a redesign of the processors.


That means we will have to live with the risks of a Spectre attack for many more years to come.


How Many Processors Are Affected? Updated!

For the complete list of affected AMD, Apple, ARM and Intel processors, please see this separate article – The Complete List Of CPUs Vulnerable To Meltdown / Spectre via the link below...


Company     Spectre 1     Spectre 2     Meltdown
AMD     295 Server CPUs
42 Workstation CPUs
396 Desktop CPUs
208 Mobile CPUs     295 Server CPUs
42 Workstation CPUs
396 Desktop CPUs
208 Mobile CPUs     None
Apple     13 Mobile SoCs     13 Mobile SoCs     13 Mobile SoCs
ARM     10 Mobile CPUs
3 Server SoCs     10 Mobile CPUs
3 Server SoCs     4 Mobile CPUs
3 Server SoCs
IBM     10 POWER CPUs     10 POWER CPUs     10 POWER CPUs
Intel     732 Server / Workstation CPUs
443 Desktop CPUs
583 Mobile CPUs
51 Mobile SoCs     732 Server / Workstation CPUs
443 Desktop CPUs
583 Mobile CPUs
51 Mobile SoCs     732 Server / Workstation CPUs
443 Desktop CPUs
583 Mobile CPUs
51 Mobile SoCs

Total
    2786 CPUs     2786 CPUs     1839 CPUs

For the complete list of affected AMD, Apple, ARM and Intel processors, please see this separate article – The Complete List Of CPUs Vulnerable To Meltdown / Spectre


Intel Detection Tool?


The Intel-SA-00086 Detection Tool does NOT detect the processor’s susceptibility to these vulnerabilities. It only checks for different vulnerabilities affecting the Intel Management Engine.

 


InSpectre


Our reader Arthur shared that the Gibson Research Corporation has an aptly-named utility called InSpectre.


It checks for Meltdown and Spectre hardware and software vulnerabilities in a Windows system.


It will help you check if your system is getting patched properly against these vulnerabilities.


What Is Being Done??? Updated! via the link below...


Note : The terms “mitigate” and “mitigation” mean the possibility of a successfully attacked are reduced, not eliminated.


    Intel has started issuing software and firmware updates for the processors introduced in the last 5 years. By the middle of January 2018, Intel expects to have issued updates for more than 90% of those CPUs.

However, that does not address the other Intel processors sold between 2010 and 2012.


    Microsoft and Linux have started to roll our the KPTI (Kernel Page Table Isolation) patch, also known as the KAISER (Kernel Address Isolation to have Side-channels Efficiently Removed) patch.

 

    The KPTI or KAISER patch, however, will only protect against the Meltdown exploit. It has no effect on a Spectre attack.

 

    Microsoft Edge and Internet Explorer 11 received the KB4056890 security update on 3 January 2018, to prevent a Meltdown attack.

 

    Firefox 57 includes changes to mitigate against both attacks.
    Google Chrome 64 will be released on 23 January 2018, with mitigations against Meltdown and Spectre attacks.

 

    For Mac systems, Apple introduced mitigations against Spectre in macOS 10.13.2 (released on 8 January 2018), with more fixes coming in macOS 10.13.3.


    For iOS devices, Apple introduced mitigations against Meltdown in iOS 11.2 and tvOS 11.2.


    On 8 January 2018, Apple released iOS 11.2.2, which mitigates the risk of the two Spectre exploits in Safari and WebKit, for iPhone 5s, iPad Air, and iPod touch 6th generation or later.


    ARM has made available the KPTI / KAISER kernel patches for Linux, while Google will provide them for Android.


    Google patched Android against both exploits with the December 2017 and January 2018 patches.


    Google shared details of their Return Rrampoline (Retpoline) binary modification technique that can be used to protect against Spectre attacks.

 
It is a software construct that ensures that any associated speculative execution will “bounce” (as if on a trampoline) endlessly.


    NVIDIA issued six driver and security updates for affected devices and software between 3-9 January 2018.


    On 11 January 2018, AMD announced that the “majority of AMD systems” have received the mitigation patches against Spectre 1, albeit some older AMD systems got bricked by bad patches.


They also announced that they will make “optional” microcode updates available for Ryzen and EPYC processors by the same week.


    In the same 11 January 2018 disclosure, AMD also shared that Linux vendors have started to roll out OS patches for both Spectre exploits, and they’re working on the “return trampoline (Retpoline)” software mitigations as well.


    On 23 January 2018, Apple released Meltdown patches for macOS Sierra and OS X El Capitan, but not macOS High Sierra.


    On 23 January 2018, Microsoft finally revealed their Spectre and Meltdown patch schedule.


    On 24 January 2018, AMD revealed their 11 software mitigations for both Spectre exploits.


    The 24 January 2018 AMD whitepaper also revealed that the AMD K10 and K8 processors are vulnerable as well, adding an additional 663 CPU models to the list of vulnerable processors.


    On 2 February 2018, Microsoft released KB4078130 to disable the Spectre 2 patches that were causing many Intel systems to randomly and spontaneously reboot.


    On 8 February 2018, an Intel microcode update schedule revealed that their Penryn-based processors are also vulnerable, adding an additional 314 CPU models to the list of vulnerable processors.


    On 14 February 2018, Intel revealed an expanded Bug Bounty Program, offering up to $250,000 in bounty awards.


Some AMD PCs Got Bricked


In the rush to mitigate against Meltdown and Spectre, Microsoft released Windows 10 patches that bricked some AMD PCs.


They blamed the incorrect / incomplete documentation provided by AMD.


You can read more about this issue @ These Windows 10 Updates Are Bricking AMD PCs!


Buggy Intel Spectre 2 Patches Updated!


Intel’s rush to patch Meltdown and Spectre resulted in buggy microcode patches, causing several generations of their CPUs to randomly and spontaneously reboot.


So far, over 800 Intel CPU models have been identified to be affected by these spontaneous reboot issues.


If you have one of the affected CPUs, please hold off BIOS / firmware updates!


Intel has identified the cause as the Spectre 2 patches in their microcode updates for some of these processors.


They’re still investigating the cause of the other affected CPU models.


Fortunately for Windows users, Microsoft issued the KB4078130 emergency update to stop the reboots while Intel worked to fix the issue.


You can read more about this issue @ The Intel Spectre Reboot Issue, and the Microsoft solution @ KB4078130 : Emergency Windows Update To Disable Intel Spectre Patches!


What Should You Do? Updated!


First and foremost – DO NOT PANIC. There is no known threat or attack using these exploits.


Although we listed a number of important patches below, the buggy updates are worse than the potential threat they try to fix.


So we advise HOLDING OFF these patches, and wait for properly-tested versions a few weeks down the line.


    If you are using Windows, make sure you install the latest Microsoft Spectre and Meltdown updates.


    If you are using a Mac system, get the latest Apple Spectre and Meltdown patches.


    If you are using an iOS device, get updated to iOS 11.2 or tvOS 11.2.


    If you are using Firefox, update to the latest Firefox 57.


    If you are using Google Chrome, make sure you watch out for Chrome 64, which will be released on 23 January.


    Download and install the latest software firmware updates from your PC, laptop, motherboard brands. In particular, install the latest driver for the Intel Management Engine (Intel ME), the Intel Trusted Execution Engine (Intel TXE), and the Intel Server Platform Services (SPS)


    If you are running an ARM processor on Linux, grab the kernel patches.


    IBM POWER system users can download and install these firmware updates.
    Users of affected NVIDIA systems can download and install these driver
and firmware updates.


    If you are using an Intel system, hold off updating your firmware, unless you have already verified that your CPU is not affected by the buggy Intel patches, or Intel has already issued corrected patches.


The Performance Impact Of The Mitigation Patches


Many benchmarks have been released, showing performance impacts of between 5% to 30%, depending on the type of benchmark and workload.


Microsoft has called those benchmark results into question, stating that they did not cover both operating system and silicon microcode patches.


They released an initial report on their findings, which we have summarised in our article – Pre-2016 Intel CPUs Hit Worst By Meltdown + Spectre Fix.
Meltdown + Spectre Reading Suggestions


    Everything On The Meltdown + Spectre CPU Flaws!
    The Complete List Of CPUs Vulnerable To Meltdown / Spectre
    The Microsoft Spectre + Meltdown Patch Schedule
    The Intel Spectre Reboot Issue – Everything You Need To Know!
    Intel Penryn CPUs Also Vulnerable To Meltdown + Spectre
    The Complete AMD Spectre Mitigation Strategy Guide
    The Apple Spectre + Meltdown Patches Detailed
    These Windows 10 Updates Are Bricking AMD PCs!
    Pre-2016 Intel CPUs Hit Worst By Meltdown + Spectre Fix
    Yes, AMD CPUs Are Also Vulnerable To Spectre 2 Exploit
    AMD K10 And K8 Processors Also Vulnerable To Spectre
    KB3078130 : Emergency Windows Update To Disable Intel Spectre Patches!

 


 

https://www.techarp.com/articles/meltdown-spectre-cpu-flaws/

 

THE LIST:


Tech ARP

    Reviews
    Articles
    Events
    News
    Guides
    BIOS Guide
    Forums


Guides


Complete List Of CPUs Vulnerable To Meltdown / Spectre Rev. 8.0
Posted by Dr. Adrian Wong
Date: March 07, 2018
in: Guides

(11) Comments
Intel Desktop CPUs Affected By Meltdown + Spectre
Intel Desktop CPUs Vulnerable To Meltdown + Spectre

Affected Variants : These Intel CPUs are affected by all three variants of the speculative execution CPU bug. They are vulnerable to the Meltdown and both Spectre exploits.
Intel Coffee Lake-S (2017)

    Intel Core i7-8700K
    Intel Core i7-8700
    Intel Core i5-8600K
    Intel Core i5-8400
    Intel Core i3-8350K
    Intel Core i3-8100

Intel Gemini Lake (2017)

    Intel Pentium Silver J5005
    Intel Celeron J4105
    Intel Celeron J4005

Intel Denverton (2017)

    Intel Celeron C3958
    Intel Celeron C3955
    Intel Celeron C3950
    Intel Celeron C3858
    Intel Celeron C3850
    Intel Celeron C3830
    Intel Celeron C3808
    Intel Celeron C3758
    Intel Celeron C3750
    Intel Celeron C3708
    Intel Celeron C3558
    Intel Celeron C3538
    Intel Celeron C3508
    Intel Celeron C3338
    Intel Celeron C3308

Intel Kaby Lake-X (2017)

    Intel Core i7-7740X
    Intel Core i5-7640X

Intel Kaby Lake-S (2017)

    Intel Core i7-7700K
    Intel Core i7-7700
    Intel Core i7-7700T
    Intel Core i5-7600K
    Intel Core i5-7600
    Intel Core i5-7600T
    Intel Core i5-7500
    Intel Core i5-7500T
    Intel Core i5-7400
    Intel Core i5-7400T
    Intel Core i3-7350K
    Intel Core i3-7320
    Intel Core i3-7300
    Intel Core i3-7300T
    Intel Core i3-7101T
    Intel Core i3-7101TE
    Intel Core i3-7100
    Intel Core i3-7100T
    Intel Pentium G4620
    Intel Pentium G4600
    Intel Pentium G4600T
    Intel Pentium G4560
    Intel Pentium G4560T
    Intel Celeron G3950
    Intel Celeron G3930
    Intel Celeron G3930T
    Intel Celeron G3930E
    Intel Celeron G3930TE

Intel Skylake-X (2017)

    Intel Core i9-7980XE
    Intel Core i9-7960X
    Intel Core i9-7940X
    Intel Core i9-7920X
    Intel Core i9-7900X
    Intel Core i7-7820X
    Intel Core i7-7800X

Intel Apollo Lake (2016)

    Intel Pentium J4205
    Intel Pentium J3455
    Intel Pentium J3355
    Intel Celeron J3455
    Intel Celeron J3355
    Intel Atom x5-E3950
    Intel Atom x5-E3940
    Intel Atom x5-E3930

Intel Skylake-H (2016)

    Intel Core i7-6785R
    Intel Core i5-6685R
    Intel Core i5-6585R

Intel Braswell (2016)

    Intel Pentium J3710
    Intel Celeron J3160
    Intel Celeron J3060
    Intel Atom x5-E8000

Intel Broadwell-E (2016)

    Intel Core i7-6950X
    Intel Core i7-6900K
    Intel Core i7-6850X
    Intel Core i7-6800X

Intel Skylake-S (2015)

    Intel Core i7-6700K
    Intel Core i7-6700
    Intel Core i7-6700T
    Intel Core i7-6700TE
    Intel Core i5-6600K
    Intel Core i5-6600
    Intel Core i5-6600T
    Intel Core i5-6500
    Intel Core i5-6500T
    Intel Core i5-6500TE
    Intel Core i5-6402P
    Intel Core i5-6400
    Intel Core i5-6400T
    Intel Core i3-6320
    Intel Core i3-6300
    Intel Core i3-6300T
    Intel Core i3-6100
    Intel Core i3-6100T
    Intel Core i3-6100TE
    Intel Core i3-6098P
    Intel Pentium G4520
    Intel Pentium G4500
    Intel Pentium G4500T
    Intel Pentium G4400
    Intel Pentium G4400T
    Intel Pentium G4400TE
    Intel Celeron G3920
    Intel Celeron G3902E
    Intel Celeron G3900
    Intel Celeron G3900T
    Intel Celeron G3900E
    Intel Celeron G3900TE

Intel Broadwell-H (2015)

    Intel Core i7-5775C
    Intel Core i7-5775R
    Intel Core i5-5675R
    Intel Core i5-5675C
    Intel Core i5-5575R

Intel Haswell-E (2014)

    Intel Core i7-5960X
    Intel Core i7-5930K
    Intel Core i7-5820K

Intel Haswell-H (2013)

    Intel Core i7-4770R
    Intel Core i5-4670R
    Intel Core i5-4570R

Intel Haswell-DT (2013)

    Intel Core i7-4790K
    Intel Core i7-4790
    Intel Core i7-4790S
    Intel Core i7-4790T
    Intel Core i7-4785T
    Intel Core i7-4771
    Intel Core i7-4770K
    Intel Core i7-4770
    Intel Core i7-4770S
    Intel Core i7-4770T
    Intel Core i7-4770TE
    Intel Core i7-4765T
    Intel Core i5-4690K
    Intel Core i5-4690
    Intel Core i5-4690S
    Intel Core i5-4690T
    Intel Core i5-4670K
    Intel Core i5-4670
    Intel Core i5-4670S
    Intel Core i5-4670T
    Intel Core i5-4590
    Intel Core i5-4590S
    Intel Core i5-4590T
    Intel Core i5-4570
    Intel Core i5-4570S
    Intel Core i5-4570T
    Intel Core i5-4570TE
    Intel Core i5-4460
    Intel Core i5-4460S
    Intel Core i5-4460T
    Intel Core i5-4440
    Intel Core i5-4440S
    Intel Core i5-4430
    Intel Core i5-4430S
    Intel Core i3-4370
    Intel Core i3-4370T
    Intel Core i3-4360
    Intel Core i3-4360T
    Intel Core i3-4350
    Intel Core i3-4350T
    Intel Core i3-4340
    Intel Core i3-4340TE
    Intel Core i3-4330
    Intel Core i3-4330T
    Intel Core i3-4330TE
    Intel Core i3-4170
    Intel Core i3-4170T
    Intel Core i3-4160
    Intel Core i3-4160T
    Intel Core i3-4150
    Intel Core i3-4150T
    Intel Core i3-4130
    Intel Core i3-4130T
    Intel Pentium G3470
    Intel Pentium G3460
    Intel Pentium G3460T
    Intel Pentium G3450
    Intel Pentium G3450T
    Intel Pentium G3440
    Intel Pentium G3440T
    Intel Pentium G3430
    Intel Pentium G3420
    Intel Pentium G3420T
    Intel Pentium G3320TE
    Intel Pentium G3260
    Intel Pentium G3260T
    Intel Pentium G3258
    Intel Pentium G3250
    Intel Pentium G3250T
    Intel Pentium G3240
    Intel Pentium G3240T
    Intel Pentium G3220
    Intel Pentium G3220T
    Intel Celeron G1850
    Intel Celeron G1840
    Intel Celeron G1840T
    Intel Celeron G1830
    Intel Celeron G1820
    Intel Celeron G1820T
    Intel Celeron G1820TE

Intel Bay Trail-D (2013)

    Intel Celeron J1900
    Intel Celeron J1850
    Intel Celeron J1800
    Intel Celeron J1750

Intel Bay Trail-I (2013)

    Intel Atom E3845
    Intel Atom E3827
    Intel Atom E3826
    Intel Atom E3825
    Intel Atom E3815
    Intel Atom E3805

Intel Ivy Bridge-E (2012)

    Intel Core i7-4960X
    Intel Core i7-4960K
    Intel Core i7-4820K

Intel Ivy Bridge (2012)

    Intel Core i7-3770K
    Intel Core i7-3770
    Intel Core i7-3770S
    Intel Core i7-3770T
    Intel Core i5-3570K
    Intel Core i5-3570
    Intel Core i5-3570S
    Intel Core i5-3570T
    Intel Core i5-3550
    Intel Core i5-3550S
    Intel Core i5-3475S
    Intel Core i5-3470
    Intel Core i5-3470S
    Intel Core i5-3470T
    Intel Core i5-3450
    Intel Core i5-3450S
    Intel Core i5-3350P
    Intel Core i5-3440
    Intel Core i5-3440S
    Intel Core i5-3335S
    Intel Core i5-3330
    Intel Core i5-3330S
    Intel Core i3-3250
    Intel Core i3-3250T
    Intel Core i3-3245
    Intel Core i3-3240
    Intel Core i3-3240T
    Intel Core i3-3225
    Intel Core i3-3220
    Intel Core i3-3220T
    Intel Core i3-3210
    Intel Pentium G2140
    Intel Pentium G2130
    Intel Pentium G2120
    Intel Pentium G2120T
    Intel Pentium G2100T
    Intel Pentium G2030
    Intel Pentium G2030T
    Intel Pentium G2020
    Intel Pentium G2020T
    Intel Pentium G2010
    Intel Celeron G1630
    Intel Celeron G1620
    Intel Celeron G1620T
    Intel Celeron G1610
    Intel Celeron G1610T

Intel Sandy Bridge-E (2011)

    Intel Core i7-3970X
    Intel Core i7-3960K
    Intel Core i7-3930K
    Intel Core i7-3820

Intel Sandy Bridge (2011)

    Intel Core i7-2700K
    Intel Core i7-2600K
    Intel Core i7-2600
    Intel Core i7-2600S
    Intel Core i5-2550K
    Intel Core i5-2500K
    Intel Core i5-2500
    Intel Core i5-2500S
    Intel Core i5-2500T
    Intel Core i5-2450P
    Intel Core i5-2405S
    Intel Core i5-2400
    Intel Core i5-2400S
    Intel Core i5-2390T
    Intel Core i5-2370P
    Intel Core i5-2320
    Intel Core i5-2310
    Intel Core i5-2300
    Intel Core i3-2130
    Intel Core i3-2125
    Intel Core i3-2120
    Intel Core i3-2120T
    Intel Core i3-2105
    Intel Core i3-2102
    Intel Core i3-2100
    Intel Core i3-2100T
    Intel Pentium G870
    Intel Pentium G860
    Intel Pentium G860T
    Intel Pentium G850
    Intel Pentium G840
    Intel Pentium G645
    Intel Pentium G645T
    Intel Pentium G640
    Intel Pentium G640T
    Intel Pentium G632
    Intel Pentium G630
    Intel Pentium G630T
    Intel Pentium G622
    Intel Pentium G620
    Intel Pentium G620T
    Intel Celeron G555
    Intel Celeron G550
    Intel Celeron G550T
    Intel Celeron G540
    Intel Celeron G540T
    Intel Celeron G530
    Intel Celeron G530T
    Intel Celeron G470
    Intel Celeron G465
    Intel Celeron G460
    Intel Celeron G440

Intel Gulftown (2010)

    Intel Core i7-990X
    Intel Core i7-980X
    Intel Core i7-980
    Intel Core i7-970

Intel Clarksdale (2010)

    Intel Core i5-680
    Intel Core i5-670
    Intel Core i5-661
    Intel Core i5-660
    Intel Core i5-655K
    Intel Core i5-650
    Intel Core i3-560
    Intel Core i3-550
    Intel Core i3-540
    Intel Core i3-530
    Intel Pentium G6960
    Intel Pentium G6951
    Intel Pentium G6950
    Intel Celeron G1101

Intel Lynnfield (2009)

    Intel Core i7-880
    Intel Core i7-875K
    Intel Core i7-870
    Intel Core i7-870S
    Intel Core i7-860
    Intel Core i7-860S
    Intel Core i5-760
    Intel Core i5-750
    Intel Core i5-750S

Intel Bloomfield (2008)

    Intel Core i7-975 Extreme Edition
    Intel Core i7-965 Extreme Edition
    Intel Core i7-960
    Intel Core i7-950
    Intel Core i7-940
    Intel Core i7-930
    Intel Core i7-920

Intel Yorkfield-6M (2008-2010)

    Intel Core 2 Quad Q9705
    Intel Core 2 Quad Q9700
    Intel Core 2 Quad Q9505S
    Intel Core 2 Quad Q9505
    Intel Core 2 Quad Q9500
    Intel Core 2 Quad Q9400S
    Intel Core 2 Quad Q9400
    Intel Core 2 Quad Q9300
    Intel Core 2 Quad Q8400S
    Intel Core 2 Quad Q8400
    Intel Core 2 Quad Q8300
    Intel Core 2 Quad Q8200S
    Intel Core 2 Quad Q8200

Intel Yorkfield (2008-2009)

    Intel Core 2 Quad Q9650
    Intel Core 2 Quad Q9550S
    Intel Core 2 Quad Q9550
    Intel Core 2 Quad Q9450S
    Intel Core 2 Quad Q9450

Intel Wolfdale (2008-2009)

    Intel Core 2 Duo E8700
    Intel Core 2 Duo E8600
    Intel Core 2 Duo E8500
    Intel Core 2 Duo E8400
    Intel Core 2 Duo E8300
    Intel Core 2 Duo E8290
    Intel Core 2 Duo E8200
    Intel Core 2 Duo E8190

Intel Wolfdale-3M (2008-2010)

    Intel Core 2 Duo E7600
    Intel Core 2 Duo E7500
    Intel Core 2 Duo E7400
    Intel Core 2 Duo E7300
    Intel Core 2 Duo E7200
    Intel Pentium E6800
    Intel Pentium E6700
    Intel Pentium E6600
    Intel Pentium E6500K
    Intel Pentium E6500
    Intel Pentium E6300
    Intel Pentium E5800
    Intel Pentium E5700
    Intel Pentium E5500
    Intel Pentium E5400
    Intel Pentium E5300
    Intel Pentium Dual-Core E5300
    Intel Pentium E5200
    Intel Pentium Dual-Core E5200
    Intel Pentium Dual-Core E2210
    Intel Celeron E3500
    Intel Celeron E3400
    Intel Celeron E3300
    Intel Celeron E3200

Intel Allendale (2008-2009)

    Intel Celeron E1600
    Intel Celeron E1500
    Intel Celeron E1400
    Intel Celeron E1200

Intel Yorkfield-XE (2007-2008)

    Intel Core 2 Extreme QX9775
    Intel Core 2 Extreme QX9770
    Intel Core 2 Extreme QX9650

Intel Conroe-L (2007-2008)

    Intel Celeron 450
    Intel Celeron 445
    Intel Celeron 430
    Intel Celeron 420
    Intel Celeron 220

Intel Kentsfield (2007)

    Intel Core 2 Quad Q6700
    Intel Core 2 Quad Q6600
    Intel Core 2 Quad Q6400

Intel Conroe-CL (2007)

    Intel Core 2 Duo E6405
    Intel Core 2 Duo E6305
    Intel Celeron 445

Intel Conroe (2006-2008)

    Intel Core 2 Duo E6850
    Intel Core 2 Duo E6750
    Intel Core 2 Duo E6700
    Intel Core 2 Duo E6600
    Intel Core 2 Duo E6550
    Intel Core 2 Duo E6540
    Intel Core 2 Duo E6420
    Intel Core 2 Duo E6400
    Intel Core 2 Duo E6320
    Intel Core 2 Duo E6300
    Intel Core 2 Duo E4700
    Intel Core 2 Duo E4600
    Intel Core 2 Duo E4500
    Intel Core 2 Duo E4400
    Intel Core 2 Duo E4300
    Intel Pentium Dual-Core E2220
    Intel Pentium Dual-Core E2200
    Intel Pentium Dual-Core E2180
    Intel Pentium Dual-Core E2160
    Intel Pentium Dual-Core E2140

Intel Kentsfield-XE (2006-2007)

    Intel Core 2 Extreme QX6850
    Intel Core 2 Extreme QX6800
    Intel Core 2 Extreme QX6700

 

Continue: Intel Mobile CPUs Affected By Meltdown + Spectre

    Contents
    1. The Complete List Of CPUs Affected By Meltdown + Spectre
    2. AMD Workstation, Desktop & Mobile CPUs Vulnerable To Spectre
    3. AMD Mobile CPUs Vulnerable To Spectre
    4. Apple, ARM & Intel CPUs Affected By Meltdown & Spectre
    5. Intel Server / Workstation CPUs Vulnerable To Meltdown + Spectre
    6. Intel Desktop CPUs Affected By Meltdown + Spectre
    7. Intel Mobile CPUs Affected By Meltdown + Spectre
    8. VIA Desktop + Mobile CPUs Vulnerable To Meltdown + Spectre

 

Everything On The Meltdown + Spectre CPU Flaws! Rev. 3.0
Everything On The Meltdown + Spectre CPU Flaws! Rev. 3.0


f February 2018

In "Articles"
These Windows 10 Updates Are Bricking AMD PCs! Rev. 4.0
These Windows 10 Updates Are Bricking AMD PCs! Rev. 4.0

f January 2018

In "Articles"
Pre-2016 Intel CPUs Hit Worst By Meltdown + Spectre Fix
Pre-2016 Intel CPUs Hit Worst By Meltdown + Spectre Fix

f January 2018

In "Articl.

Tags:AMDappleARMBugBug fixComputer securityCPUCybersecurityData SecurityDesktop CPUIntelMediaTekMeltdownMobile CPUMobile SecurityProcessorQualcommSamsungSecurity bugServer CPUSmartphoneSpectre
Previous : New Samsung Galaxy S9 Bixby Features Demonstrated!
Next : Acer Aspire S 24 AIO + Three Acer Monitors Revealed!
About The Author
Dr. Adrian Wong

Related posts via the link below...

    How To Reindex Your Website Using Google Search Console
    How To Reindex Your Website Using Google Search Console
    March 13, 2018
    How To Detect + Fix Sitemap Problems In Google Search Console
    How To Detect + Fix Sitemap Problems In Google Search Console
    March 13, 2018
    The Complete AMD Spectre Mitigation Strategy Guide Rev. 2.0
    The Complete AMD Spectre Mitigation Strategy Guide Rev. 2.0
    February 28, 2018
    The Microsoft Spectre + Meltdown Patch Schedule Rev. 2.0
    The Microsoft Spectre + Meltdown Patch Schedule Rev. 2.0
    February 23, 2018

 

LIST SOURCE:

https://www.techarp.com/guides/complete-meltdown-spectre-cpu-list/6/


--MORE--

Research papers:

https://meltdownattack.com

 

 

Link to comment
Share on other sites


  • Replies 7
  • Views 1.9k
  • Created
  • Last Reply

Questions & Answers

Am I affected by the vulnerability?

Most certainly, yes.

Can I detect if someone has exploited Meltdown or Spectre against me?

Probably not. The exploitation does not leave any traces in traditional log files.

Can my antivirus detect or block this attack?

While possible in theory, this is unlikely in practice. Unlike usual malware, Meltdown and Spectre are hard to distinguish from regular benign applications. However, your antivirus may detect malware which uses the attacks by comparing binaries after they become known.

What can be leaked?

If your system is affected, our proof-of-concept exploit can read the memory content of your computer. This may include passwords and sensitive data stored on the system.

Has Meltdown or Spectre been abused in the wild?

We don't know.

Is there a workaround/fix?

There are patches against Meltdown for Linux ( KPTI (formerly KAISER)), Windows, and OS X. There is also work to harden software against future exploitation of Spectre, respectively to patch software after exploitation through Spectre ( LLVM patch, MSVC, ARM speculation barrier header).

Which systems are affected by Meltdown?

Desktop, Laptop, and Cloud computers may be affected by Meltdown. More technically, every Intel processor which implements out-of-order execution is potentially affected, which is effectively every processor since 1995 (except Intel Itanium and Intel Atom before 2013). We successfully tested Meltdown on Intel processor generations released as early as 2011. Currently, we have only verified Meltdown on Intel processors. At the moment, it is unclear whether AMD processors are also affected by Meltdown. According to ARM, some of their processors are also affected.

Which systems are affected by Spectre?

Almost every system is affected by Spectre: Desktops, Laptops, Cloud Servers, as well as Smartphones. More specifically, all modern processors capable of keeping many instructions in flight are potentially vulnerable. In particular, we have verified Spectre on Intel, AMD, and ARM processors.

Which cloud providers are affected by Meltdown?

Cloud providers which use Intel CPUs and Xen PV as virtualization without having patches applied. Furthermore, cloud providers without real hardware virtualization, relying on containers that share one kernel, such as Docker, LXC, or OpenVZ are affected.

What is the difference between Meltdown and Spectre?

Meltdown breaks the mechanism that keeps applications from accessing arbitrary system memory. Consequently, applications can access system memory. Spectre tricks other applications into accessing arbitrary locations in their memory. Both attacks use side channels to obtain the information from the accessed memory location. For a more technical discussion we refer to the papers ( Meltdown and Spectre)

Why is it called Meltdown?

The vulnerability basically melts security boundaries which are normally enforced by the hardware.

Why is it called Spectre?

The name is based on the root cause, speculative execution. As it is not easy to fix, it will haunt us for quite some time.

Is there more technical information about Meltdown and Spectre?

Yes, there is an academic paper and a blog post about Meltdown, and an academic paper about Spectre. Furthermore, there is a Google Project Zero blog entry about both attacks.

What are CVE-2017-5753 and CVE-2017-5715?

CVE-2017-5753 and CVE-2017-5715 are the official references to Spectre. CVE is the Standard for Information Security Vulnerability Names maintained by MITRE.

What is the CVE-2017-5754?

CVE-2017-5754 is the official reference to Meltdown. CVE is the Standard for Information Security Vulnerability Names maintained by MITRE.

 

 

https://meltdownattack.com
Link to comment
Share on other sites


Regarding the fixes and patches, what are the differences between the Intel microcode updates, Windows security updates, and OEM BIOS updates?

Link to comment
Share on other sites


1 hour ago, sixoclock said:

Regarding the fixes and patches, what are the differences between the Intel microcode updates, Windows security updates, and OEM BIOS updates?

 

simply

 

Windows Updates = defense by kernel
Intel microcode updates = defence by CPU microcode
OEM Bios updates = defende by BIOS security

 

so the best is update all for security in each area.

Link to comment
Share on other sites


3 minutes ago, SPECTRUM said:

 

simply

 

Windows Updates = defense by kernel
Intel microcode updates = defence by CPU microcode
OEM Bios updates = defende by BIOS security

 

so the best is update all for security in each area.

 

From my understanding, if you update either the microcode or BIOS, Window updates are no longer needed, is that correct?

 

I want to avoid the Window updates because they are cumulative and rollup, which break my custom machine. Used to be able to selectively choose Window security updates until they introduced cumulative and rollup updates :(

Link to comment
Share on other sites


32 minutes ago, sixoclock said:

 

From my understanding, if you update either the microcode or BIOS, Window updates are no longer needed, is that correct?

 

I want to avoid the Window updates because they are cumulative and rollup, which break my custom machine. Used to be able to selectively choose Window security updates until they introduced cumulative and rollup updates :(

 

Windows Updates are needed anyway.

 

as I told you previously update all for best security, consider it as 3 walls of security… microcode+bios+kernel.

 

cumulative and rollup updates shouldn't broke your machine unless you have damaged system files or broken permissions in folders/files/registry.

Link to comment
Share on other sites


  • Administrator

Even though we know all of them are affected, but still a great list this.

Link to comment
Share on other sites


Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...